First published: Wed Jun 28 2023(Updated: )
A race condition leading to a use-after-free issue was found in the QXL driver in the Linux kernel.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.5 | 6.5 |
Linux Kernel | <6.5 | |
Linux Kernel | =6.5-rc1 | |
Linux Kernel | =6.5-rc2 | |
Linux Kernel | =6.5-rc3 | |
Linux Kernel | =6.5-rc4 | |
Linux Kernel | =6.5-rc5 | |
Linux Kernel | =6.5-rc6 | |
Red Hat Fedora | =38 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39198 has a high severity rating due to the potential for a use-after-free vulnerability in the QXL driver.
To mitigate CVE-2023-39198, update your Linux kernel to version 6.5 or higher.
CVE-2023-39198 affects versions of the Linux kernel up to 6.5, including specific release candidates.
A use-after-free vulnerability like CVE-2023-39198 occurs when a program continues to use a pointer after the memory it points to has been freed.
CVE-2023-39198 is primarily associated with Red Hat Enterprise Linux, Fedora, and Debian distributions.