7
CVSSv3

CVE-2023-6546

Published: 21/12/2023 Updated: 01/05/2024
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

This vulnerability allows local malicious users to execute arbitrary code on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the n_gsm driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 6.5

linux linux kernel

fedoraproject fedora 39

redhat enterprise linux 8.0

redhat enterprise linux 9.0

Vendor Advisories

An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Solar Designer &lt;sol ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Donald Buczek &lt;bucz ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Solar Designer &lt;sol ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: "Dr Christopher Kunz" &lt ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Kyle Zeng &lt;zengyhky ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Kyle Zeng &lt;zengyhky ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Solar Designer &lt;sol ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: New Linux LPE via GSMIOC_SETCONF_DLCI? <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Greg KH &lt;greg () kr ...

Github Repositories

Linux Kernel GSM Multiplexing Race Condition Local Privilege Escalation Vulnerability (CVE-2023-6546) wwwzerodayinitiativecom/advisories/ZDI-24-020/ Contact me: Twitter: twittercom/p1k4l4 Linkedin: wwwlinkedincom/in/nassim-asrir-b73a57122/ Overview This is a custom exploit which targets Ubuntu 1804+2004 LTS/Centos 8/RHEL 8 to attain root privilege