Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6546: Use After Free in Red Hat Red Hat Enterprise Linux 8

0
High
VulnerabilityCVE-2023-6546cvecve-2023-6546
Published: Thu Dec 21 2023 (12/21/2023, 20:01:03 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.

AI-Powered Analysis

AILast updated: 11/06/2025, 20:05:51 UTC

Technical Analysis

CVE-2023-6546 is a use-after-free vulnerability identified in the GSM 0710 tty multiplexor component of the Linux kernel as implemented in Red Hat Enterprise Linux 8. The issue stems from a race condition triggered when two threads simultaneously invoke the GSMIOC_SETCONF ioctl command on the same tty file descriptor while the gsm line discipline is active. This concurrency leads to improper handling of the gsm_dlci structure during the restart of the gsm mux, resulting in a use-after-free condition. Such memory corruption can be exploited by a local unprivileged user to escalate privileges, potentially gaining root-level access or other elevated capabilities. The vulnerability has a CVSS 3.1 base score of 7.0, indicating high severity, with attack vector local, attack complexity high, privileges required low, no user interaction, and impacts on confidentiality, integrity, and availability. Although no public exploits are known, the flaw poses a significant risk in environments where local user access is possible. The vulnerability affects Red Hat Enterprise Linux 8 systems that enable the gsm line discipline, which is typically used in telecom or embedded device contexts. The race condition and use-after-free vulnerability highlight the importance of proper synchronization in kernel ioctl handling to prevent memory corruption and privilege escalation.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying on Red Hat Enterprise Linux 8, such as telecommunications, critical infrastructure, and enterprises using embedded Linux systems with GSM multiplexing. Successful exploitation allows local attackers to escalate privileges, potentially leading to full system compromise, unauthorized access to sensitive data, disruption of services, and lateral movement within networks. Confidentiality, integrity, and availability of affected systems could be severely impacted. Organizations with multi-user environments or those providing local access to untrusted users are particularly vulnerable. The high attack complexity somewhat limits exploitation but does not eliminate risk, especially in environments where skilled attackers have local access. The absence of known exploits in the wild currently reduces immediate threat but patching remains critical to prevent future attacks.

Mitigation Recommendations

1. Apply official patches and updates from Red Hat as soon as they become available to address CVE-2023-6546. 2. Restrict local user access to trusted personnel only, minimizing the risk of local exploitation. 3. Disable the gsm line discipline if it is not required for operational purposes to reduce the attack surface. 4. Implement strict access controls and monitoring on ioctl system calls, particularly GSMIOC_SETCONF, to detect anomalous or concurrent usage patterns. 5. Employ kernel security modules (e.g., SELinux) to enforce least privilege and limit the capabilities of local users. 6. Conduct regular audits of local user activities and system logs to identify potential exploitation attempts. 7. For embedded or telecom devices using GSM multiplexing, ensure firmware and kernel components are updated and hardened against race conditions. 8. Educate system administrators about the risks of race conditions and use-after-free vulnerabilities to improve incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-12-06T07:11:48.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690cfc1ee0be39967232fe35

Added to database: 11/6/2025, 7:50:54 PM

Last enriched: 11/6/2025, 8:05:51 PM

Last updated: 2/7/2026, 2:14:44 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats