Vulnerability Description
A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 5.19 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2193097Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/67d7d8ad99bePatch
- https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
- https://bugzilla.redhat.com/show_bug.cgi?id=2193097Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/67d7d8ad99bePatch
- https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
FAQ
What is CVE-2023-2513?
CVE-2023-2513 is a vulnerability with a CVSS score of 6.7 (MEDIUM). A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to caus...
How severe is CVE-2023-2513?
CVE-2023-2513 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2513?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux.