CVE-2023-1077Type Confusion in Kernel

Severity
7.0HIGHNVD
OSV5.5
EPSS
0.0%
top 93.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateJan 30

Description

In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages6 packages

NVDlinux/linux_kernel2.6.254.19.293+5
Debianlinux/linux_kernel< 5.10.178-1+3
Ubuntulinux/linux_kernel< 5.4.0-152.169+1
CVEListV5linux/linux_kernelunknown
debiandebian/linux< linux 6.1.20-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

10
OSV
linux-iot vulnerabilities2023-07-27
OSV
linux-xilinx-zynqmp vulnerabilities2023-07-12
OSV
linux-azure-fde vulnerabilities2023-07-12
OSV
linux-intel-iotg vulnerabilities2023-07-06
OSV
linux-aws, linux-azure, linux-bluefield, linux-gcp, linux-gke, linux-gkeop, linux-ibm, linux-kvm, linux-oracle, linux-raspi vulnerabilities2023-06-22

📋Vendor Advisories

16
Chrome
Stable Channel Update for Desktop: CVE-2024-10772024-01-30
Chrome
Stable Channel Update for Desktop: CVE-2024-31692024-01-30
Red Hat
espeak-ng: floating point exception in PeaksToHarmspect at wavegen.c2023-12-12
Ubuntu
Linux kernel (IoT) vulnerabilities2023-07-27
Ubuntu
Linux kernel (Azure CVM) vulnerabilities2023-07-12