CVE-2023-45898Use After Free in Kernel

CWE-416Use After Free14 documents9 sources
Severity
7.8HIGHNVD
OSV6.0OSV5.5
EPSS
0.0%
top 96.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateApr 11

Description

The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.56.5.4
Debianlinux/linux_kernel< 6.5.6-1+1
debiandebian/linux< linux 6.5.6-1 (forky)

Patches

🔴Vulnerability Details

5
OSV
linux-azure vulnerabilities2024-01-09
OSV
linux-gcp vulnerabilities2023-12-06
OSV
linux, linux-aws, linux-laptop, linux-lowlatency, linux-oem-6.5, linux-oracle, linux-raspi, linux-starfive vulnerabilities2023-12-06
OSV
CVE-2023-45898: The Linux kernel before 62023-10-16
GHSA
GHSA-3x3x-vjcr-56cc: The Linux kernel before 62023-10-16

📋Vendor Advisories

7
CISA ICS
Siemens SIMATIC S7-15002024-04-11
Ubuntu
Linux kernel (Azure) vulnerabilities2024-01-09
Ubuntu
Linux kernel vulnerabilities2023-12-06
Ubuntu
Linux kernel (GCP) vulnerabilities2023-12-06
Red Hat
kernel: use-after-free in fs/ext4/extents_status.c2023-10-23

💬Community

1
Bugzilla
CVE-2023-45898 kernel: use-after-free in fs/ext4/extents_status.c2023-10-23
CVE-2023-45898 — Use After Free in Linux Kernel | cvebase