#VU106172 Use-after-free in Linux kernel - CVE-2023-52974
Published: March 27, 2025 / Updated: May 11, 2025
Vulnerability identifier: #VU106172
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-52974
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iscsi_sw_tcp_host_get_param() and iscsi_sw_tcp_session_create() functions in drivers/scsi/iscsi_tcp.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/0aaabdb900c7415caa2006ef580322f7eac5f6b6
- https://git.kernel.org/stable/c/496af9d3682ed4c28fb734342a09e6cc0c056ea4
- https://git.kernel.org/stable/c/61e43ebfd243bcbad11be26bd921723027b77441
- https://git.kernel.org/stable/c/6abd4698f4c8a78e7bbfc421205c060c199554a0
- https://git.kernel.org/stable/c/9758ffe1c07b86aefd7ca8e40d9a461293427ca0
- https://git.kernel.org/stable/c/d4d765f4761f9e3a2d62992f825aeee593bcb6b9
- https://git.kernel.org/stable/c/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.306
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.273
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.168
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.93
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.232
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2