Race Condition Affecting torvalds/linux package, versions [,6.5-rc7)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.27% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-6138237
  • published22 Dec 2023
  • disclosed21 Dec 2023
  • creditMauro Matteo Cascella

Introduced: 21 Dec 2023

CVE-2023-6546  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 6.5-rc7 or higher.

Overview

Affected versions of this package are vulnerable to Race Condition in the n_gsm kernel module. A local unprivileged user could use this vulnerability to escalate their privileges on the system.

Note: The flaw occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled and leads to a use-after-free on a struct gsm_dlci while restarting the gsm mux.

CVSS Base Scores

version 3.1