{"id":"CVE-2023-2235","details":"A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n","modified":"2026-03-15T21:45:02.120956Z","published":"2023-05-01T13:15:44.713Z","related":["ALSA-2023:3708","ALSA-2023:3723","ALSA-2023:4517","ALSA-2023:4541","SUSE-SU-2023:2140-1","SUSE-SU-2023:2141-1","SUSE-SU-2023:2231-1","SUSE-SU-2023:2646-1","SUSE-SU-2023:2809-1","SUSE-SU-2023:2871-1","SUSE-SU-2023:3055-1","SUSE-SU-2023:3063-1","SUSE-SU-2023:3079-1","SUSE-SU-2023:3116-1","SUSE-SU-2023:3153-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230609-0002/"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2"},{"type":"FIX","url":"https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.13"},{"fixed":"5.15.104"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.21"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.2.8"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2235.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}