Lucene search

K
f5F5F5:K000135122
HistoryJun 20, 2023 - 12:00 a.m.

K000135122 : Linux kernel vulnerability CVE-2023-0461

2023-06-2000:00:00
my.f5.com
20
linux kernel
use-after-free
vulnerability
privilege escalation
local
exploit
restricted information
dos
authorized modifications

AI Score

7

Confidence

High

EPSS

0

Percentile

5.1%

Security Advisory Description

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c (CVE-2023-0461)

Impact

A local authenticated user may be able to exploit the vulnerability to escalate privileges and gain access to restricted information, make unauthorized modifications to files, or cause a denial-of-service (DoS).