A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.
The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.
We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2023-05-01T12:51:25.433Z
Updated: 2024-08-02T06:19:13.580Z
Reserved: 2023-04-21T17:43:15.944Z
Link: CVE-2023-2235
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-05-01T13:15:44.713
Modified: 2024-11-21T07:58:12.630
Link: CVE-2023-2235
Redhat