← Zuruck zu CVEs
CVE-2023-3776
HIGH7.8
Beschreibung
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht7/21/2023
Zuletzt geandert2/13/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
debian:debian_linuxlinux:linux_kernel
Schwachen (CWE)
CWE-416CWE-416
Referenzen
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html(cve-coordination@google.com)
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html(cve-coordination@google.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f(cve-coordination@google.com)
https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f(cve-coordination@google.com)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(cve-coordination@google.com)
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html(cve-coordination@google.com)
https://security.netapp.com/advisory/ntap-20240202-0003/(cve-coordination@google.com)
https://www.debian.org/security/2023/dsa-5480(cve-coordination@google.com)
https://www.debian.org/security/2023/dsa-5492(cve-coordination@google.com)
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f(af854a3a-2127-422b-91ae-364da2661108)
https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240202-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5480(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5492(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.