CVE-2023-4206
Summary
| CVE | CVE-2023-4206 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-06 14:15:00 UTC |
| Updated | 2023-09-11 17:57:00 UTC |
| Description | A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.
When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| kernel.dance/b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 |
MISC |
kernel.dance |
|
| Debian -- Security Information -- DSA-5492-1 linux |
MISC |
www.debian.org |
|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 160949 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12842)
- 161066 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-6583)
- 161147 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7077)
- 161194 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7423)
- 242399 Red Hat Update for kernel security (RHSA-2023:6583)
- 242434 Red Hat Update for kernel-rt security (RHSA-2023:6901)
- 242451 Red Hat Update for kernel security (RHSA-2023:7077)
- 242482 Red Hat Update for kernel-rt (RHSA-2023:7379)
- 242497 Red Hat Update for kpatch-patch (RHSA-2023:7418)
- 242498 Red Hat Update for kernel-rt (RHSA-2023:7424)
- 242501 Red Hat Update for kernel (RHSA-2023:7423)
- 242502 Red Hat Update for kpatch-patch (RHSA-2023:7419)
- 242518 Red Hat Update for kpatch-patch (RHSA-2023:7558)
- 242521 Red Hat Update for kernel security (RHSA-2023:7539)
- 242612 Red Hat Update for kernel security (RHSA-2023:7370)
- 257270 Centos Security Update for kernel
- 257295 CentOS Security Update for kernel (CESA-2023:7423)
- 356403 Amazon Linux Security Advisory for kernel : ALAS2-2023-2268
- 356571 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-155
- 356578 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-054
- 356588 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-154
- 390290 Oracle Managed Virtualization (VM) Server for x86 Security Update for kernel (OVMSA-2023-0023)
- 6000220 Debian Security Update for linux (DSA 5492-1)
- 6000429 Debian Security Update for linux (DLA 3710-1)
- 673406 EulerOS Security Update for kernel (EulerOS-SA-2023-3182)
- 673563 EulerOS Security Update for kernel (EulerOS-SA-2024-1144)
- 673848 EulerOS Security Update for kernel (EulerOS-SA-2023-3217)
- 907273 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (28674-1)
- 941453 AlmaLinux Security Update for kernel (ALSA-2023:7077)