Bug 2255498 (CVE-2023-6546, ZDI-CAN-20527) - CVE-2023-6546 kernel: GSM multiplexing race condition leads to privilege escalation
Summary: CVE-2023-6546 kernel: GSM multiplexing race condition leads to privilege esca...
Keywords:
Status: NEW
Alias: CVE-2023-6546, ZDI-CAN-20527
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2255517
Blocks: 2255503
TreeView+ depends on / blocked
 
Reported: 2023-12-21 10:58 UTC by Mauro Matteo Cascella
Modified: 2024-05-06 01:25 UTC (History)
49 users (show)

Fixed In Version: kernel 6.5-rc7
Doc Type: If docs needed, set a value
Doc Text:
A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:1699 0 None None None 2024-04-08 14:54:14 UTC
Red Hat Product Errata RHBA-2024:2634 0 None None None 2024-05-01 01:22:16 UTC
Red Hat Product Errata RHBA-2024:2650 0 None None None 2024-05-02 00:15:06 UTC
Red Hat Product Errata RHBA-2024:2686 0 None None None 2024-05-02 22:50:12 UTC
Red Hat Product Errata RHSA-2024:0930 0 None None None 2024-02-21 00:27:44 UTC
Red Hat Product Errata RHSA-2024:0937 0 None None None 2024-02-22 03:10:48 UTC
Red Hat Product Errata RHSA-2024:1018 0 None None None 2024-02-28 12:41:49 UTC
Red Hat Product Errata RHSA-2024:1019 0 None None None 2024-02-28 12:34:26 UTC
Red Hat Product Errata RHSA-2024:1055 0 None None None 2024-02-29 15:47:09 UTC
Red Hat Product Errata RHSA-2024:1250 0 None None None 2024-03-12 00:44:42 UTC
Red Hat Product Errata RHSA-2024:1253 0 None None None 2024-03-12 01:01:14 UTC
Red Hat Product Errata RHSA-2024:1306 0 None None None 2024-03-13 09:08:19 UTC
Red Hat Product Errata RHSA-2024:1607 0 None None None 2024-04-02 15:55:41 UTC
Red Hat Product Errata RHSA-2024:1612 0 None None None 2024-04-02 15:52:38 UTC
Red Hat Product Errata RHSA-2024:1614 0 None None None 2024-04-02 17:21:46 UTC
Red Hat Product Errata RHSA-2024:2394 0 None None None 2024-04-30 10:14:51 UTC
Red Hat Product Errata RHSA-2024:2621 0 None None None 2024-04-30 16:59:20 UTC
Red Hat Product Errata RHSA-2024:2697 0 None None None 2024-05-06 01:25:28 UTC

Description Mauro Matteo Cascella 2023-12-21 10:58:33 UTC
A race condition was found in the GSM 0710 tty multiplexor (drivers/tty/n_gsm.c) in the Linux kernel. The flaw occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled and leads to a use-after-free on a struct gsm_dlci while restarting the gsm mux. A local unprivileged user could use this vulnerability to escalate their privileges on the system.

ZDI Security Advisory:
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527

Upstream fix:
https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3

Comment 9 Mauro Matteo Cascella 2023-12-21 13:52:32 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2255517]

Comment 10 Justin M. Forbes 2023-12-21 15:04:23 UTC
This was fixed for Fedora with the 6.4.12 stable kernel updates.

Comment 14 errata-xmlrpc 2024-02-21 00:27:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0930 https://access.redhat.com/errata/RHSA-2024:0930

Comment 15 errata-xmlrpc 2024-02-22 03:10:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0937 https://access.redhat.com/errata/RHSA-2024:0937

Comment 17 errata-xmlrpc 2024-02-28 12:34:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1019 https://access.redhat.com/errata/RHSA-2024:1019

Comment 18 errata-xmlrpc 2024-02-28 12:41:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1018 https://access.redhat.com/errata/RHSA-2024:1018

Comment 19 errata-xmlrpc 2024-02-29 15:47:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1055 https://access.redhat.com/errata/RHSA-2024:1055

Comment 21 errata-xmlrpc 2024-03-12 00:44:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1250

Comment 22 errata-xmlrpc 2024-03-12 01:01:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1253 https://access.redhat.com/errata/RHSA-2024:1253

Comment 24 errata-xmlrpc 2024-03-13 09:08:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1306

Comment 25 errata-xmlrpc 2024-04-02 15:52:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1612 https://access.redhat.com/errata/RHSA-2024:1612

Comment 26 errata-xmlrpc 2024-04-02 15:55:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1607 https://access.redhat.com/errata/RHSA-2024:1607

Comment 27 errata-xmlrpc 2024-04-02 17:21:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1614 https://access.redhat.com/errata/RHSA-2024:1614

Comment 30 errata-xmlrpc 2024-04-30 10:14:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394

Comment 31 errata-xmlrpc 2024-04-30 16:59:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:2621 https://access.redhat.com/errata/RHSA-2024:2621

Comment 32 errata-xmlrpc 2024-05-06 01:25:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:2697 https://access.redhat.com/errata/RHSA-2024:2697


Note You need to log in before you can comment on or make changes to this bug.