We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Bugpilot (Bug tracking)

Ok

THREATINT CVE Home CVE Diag Help
PUBLISHED

CVE-2023-6546

Kernel: gsm multiplexing race condition leads to privilege escalation

Reserved:2023-12-06
Published:2023-12-21
Updated:2024-04-02

Description

A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.



HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Use After Free

Product status

6.5-rc7
unaffected

Default status
affected

0:4.18.0-513.24.1.rt7.326.el8_9 before *
unaffected

Default status
affected

0:4.18.0-513.24.1.el8_9 before *
unaffected

Default status
unaffected

Default status
affected

0:4.18.0-372.93.1.el8_6 before *
unaffected

Default status
unaffected

Default status
affected

0:5.14.0-70.93.2.el9_0 before *
unaffected

Default status
affected

0:5.14.0-70.93.1.rt21.165.el9_0 before *
unaffected

Default status
unaffected

Default status
affected

0:5.14.0-284.55.1.el9_2 before *
unaffected

Default status
affected

0:5.14.0-284.55.1.rt14.340.el9_2 before *
unaffected

Default status
unaffected

Default status
affected

0:4.18.0-372.93.1.el8_6 before *
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
affected

Default status
affected

Default status
affected

Timeline

2023-12-18:Reported to Red Hat.
2023-12-21:Made public.

References

https://access.redhat.com/errata/RHSA-2024:0930 (RHSA-2024:0930) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:0937 (RHSA-2024:0937) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1018 (RHSA-2024:1018) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1019 (RHSA-2024:1019) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1055 (RHSA-2024:1055) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1250 (RHSA-2024:1250) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1253 (RHSA-2024:1253) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1306 (RHSA-2024:1306) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1607 (RHSA-2024:1607) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1612 (RHSA-2024:1612) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:1614 (RHSA-2024:1614) vendor-advisory

https://access.redhat.com/security/cve/CVE-2023-6546 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2255498 (RHBZ#2255498) issue-tracking

https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3

https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527

cve.org CVE-2023-6546

nvd.nist.gov CVE-2023-6546

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-6546