Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2023-39198
HistoryNov 09, 2023 - 7:15 p.m.

CVE-2023-39198 Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create()

2023-11-0919:15:47
CWE-416
redhat
github.com
4
cve-2023-39198
kernel
qxl
race condition
use-after-free
denial of service
privilege escalation

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.004

Percentile

73.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.004

Percentile

73.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total