CVE-2023-4208
Summary
| CVE | CVE-2023-4208 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-06 14:15:00 UTC |
| Updated | 2023-09-11 18:12:00 UTC |
| Description | A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.
When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| kernel.dance/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 |
MISC |
kernel.dance |
|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
|
| Debian -- Security Information -- DSA-5492-1 linux |
MISC |
www.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161044 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12970)
- 161066 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-6583)
- 161147 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7077)
- 161194 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7423)
- 242399 Red Hat Update for kernel security (RHSA-2023:6583)
- 242434 Red Hat Update for kernel-rt security (RHSA-2023:6901)
- 242451 Red Hat Update for kernel security (RHSA-2023:7077)
- 242482 Red Hat Update for kernel-rt (RHSA-2023:7379)
- 242497 Red Hat Update for kpatch-patch (RHSA-2023:7418)
- 242498 Red Hat Update for kernel-rt (RHSA-2023:7424)
- 242501 Red Hat Update for kernel (RHSA-2023:7423)
- 242502 Red Hat Update for kpatch-patch (RHSA-2023:7419)
- 242518 Red Hat Update for kpatch-patch (RHSA-2023:7558)
- 242521 Red Hat Update for kernel security (RHSA-2023:7539)
- 242612 Red Hat Update for kernel security (RHSA-2023:7370)
- 257270 Centos Security Update for kernel
- 257295 CentOS Security Update for kernel (CESA-2023:7423)
- 356403 Amazon Linux Security Advisory for kernel : ALAS2-2023-2268
- 356571 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-155
- 356578 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-054
- 356588 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-154
- 390291 Oracle VM Server for x86 Security Update for kernel (OVMSA-2023-0024)
- 6000220 Debian Security Update for linux (DSA 5492-1)
- 6000429 Debian Security Update for linux (DLA 3710-1)
- 673406 EulerOS Security Update for kernel (EulerOS-SA-2023-3182)
- 673563 EulerOS Security Update for kernel (EulerOS-SA-2024-1144)
- 673848 EulerOS Security Update for kernel (EulerOS-SA-2023-3217)
- 907289 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (28677-1)
- 941453 AlmaLinux Security Update for kernel (ALSA-2023:7077)