Vulnerability Description
A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.13, < 5.15.104 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fdMitigationPatch
- https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2Patch
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fdMitigationPatch
- https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2Patch
- https://security.netapp.com/advisory/ntap-20230609-0002/
FAQ
What is CVE-2023-2235?
CVE-2023-2235 is a vulnerability with a CVSS score of 7.8 (HIGH). A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings'...
How severe is CVE-2023-2235?
CVE-2023-2235 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2235?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.