Lucene search

K
nvd[email protected]NVD:CVE-2023-3609
HistoryJul 21, 2023 - 9:15 p.m.

CVE-2023-3609

2023-07-2121:15:11
CWE-416
web.nvd.nist.gov
1
linux kernel
use-after-free
privilege escalation
net/sched
vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A use-after-free vulnerability in the Linux kernel’s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

Affected configurations

NVD
Node
linuxlinux_kernelRange4.146.4
OR
linuxlinux_kernelMatch6.4rc1
OR
linuxlinux_kernelMatch6.4rc2
OR
linuxlinux_kernelMatch6.4rc3
OR
linuxlinux_kernelMatch6.4rc4
OR
linuxlinux_kernelMatch6.4rc5
OR
linuxlinux_kernelMatch6.4rc6
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%