A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.

The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.

We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.

Project Subscriptions

Vendors Products
Linux Kernel Subscribe
Enterprise Linux Subscribe
Rhel Eus Subscribe
Rhev Hypervisor Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-33745 A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
Ubuntu USN Ubuntu USN USN-6175-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6186-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6300-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6311-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6332-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6347-1 Linux kernel (Azure CVM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6385-1 Linux kernel (OEM) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-03-05T19:03:27.818Z

Reserved: 2023-04-21T17:43:15.944Z

Link: CVE-2023-2235

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:13.580Z

cve-icon NVD

Status : Modified

Published: 2023-05-01T13:15:44.713

Modified: 2024-11-21T07:58:12.630

Link: CVE-2023-2235

cve-icon Redhat

Severity : Important

Publid Date: 2023-03-15T00:00:00Z

Links: CVE-2023-2235 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses