CVE-2023-4134Use After Free in Kernel

CWE-416Use After Free18 documents7 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 14

Description

A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianlinux/linux_kernel< 6.4.4-1+1

Also affects: Fedora 38

Patches

🔴Vulnerability Details

7
GHSA
GHSA-hpvm-q8v2-j94r: A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel2024-11-14
OSV
CVE-2023-4134: A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel2024-11-14
CVEList
Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work()2024-11-14
OSV
linux-intel-iotg, linux-intel-iotg-5.15 vulnerabilities2024-03-27
OSV
linux-kvm vulnerabilities2024-03-20

📋Vendor Advisories

10
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-03-27
Ubuntu
Linux kernel (AWS) vulnerabilities2024-03-20
Ubuntu
Linux kernel (KVM) vulnerabilities2024-03-20
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-03-19
Ubuntu
Linux kernel vulnerabilities2024-03-13
CVE-2023-4134 — Use After Free in Linux Kernel | cvebase