CVE-2023-39198Use After Free in Kernel

Severity
6.4MEDIUMNVD
CNA7.5
EPSS
0.0%
top 99.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateJan 10

Description

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.5 | Impact: 5.9

Affected Packages2 packages

NVDlinux/linux_kernel< 6.5+1
Debianlinux/linux_kernel< 5.10.209-1+3

Also affects: Enterprise Linux 8.0, 9.0, Fedora 38

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qhp7-446p-xq88: A race condition was found in the QXL driver in the Linux kernel2023-11-09
OSV
CVE-2023-39198: A race condition was found in the QXL driver in the Linux kernel2023-11-09
CVEList
Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create()2023-11-09

📋Vendor Advisories

10
Ubuntu
Linux kernel vulnerabilities2024-01-10
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-01-05
Ubuntu
Linux kernel (Low Latency) vulnerabilities2023-12-13
Ubuntu
Linux kernel vulnerabilities2023-12-13
Ubuntu
Linux kernel (GKE) vulnerabilities2023-12-12

💬Community

1
Bugzilla
CVE-2023-39198 kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create()2023-06-28
CVE-2023-39198 — Use After Free in Linux Kernel | cvebase