A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:44
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2024:0930 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0937 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1018 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1019 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1055 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1250 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1253 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1306 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1607 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1612 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1614 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2093 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2394 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2621 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2697 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4577 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4729 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4731 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-6546 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255498 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3 - Patch | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527 - |
14 Sep 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Aug 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 May 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Apr 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Apr 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Mar 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Feb 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Feb 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jan 2024, 15:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
CWE | CWE-362 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255498 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-6546 - Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3 - Patch |
21 Dec 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-21 20:15
Updated : 2024-11-21 08:44
NVD link : CVE-2023-6546
Mitre link : CVE-2023-6546
CVE.ORG link : CVE-2023-6546
JSON object : View
Products Affected
linux
- linux_kernel
redhat
- enterprise_linux
fedoraproject
- fedora