Lucene search

K
redhatcveRedhat.comRH:CVE-2023-4208
HistorySep 07, 2023 - 8:40 p.m.

CVE-2023-4208

2023-09-0720:40:36
redhat.com
access.redhat.com
36
cve-2023-4208
classifiers
use-after-free
net/sched/cls_fw.c
linux kernel
local user
crash
escalate privileges
mitigation
blacklisting
red hat

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

25.6%

There are 3 CVEs for the use-after-free flaw found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. A local user could use any of these flaws to crash the system or potentially escalate their privileges on the system. Similar CVE-2023-4128 was rejected as a duplicate.

Mitigation

To mitigate this issue, prevent the module cls_u32 from being loaded by blacklisting the module to prevent it from loading automatically.

https://access.redhat.com/solutions/41278   

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

25.6%