← Voltar para CVEs
CVE-2023-1829
HIGH7.8
Descricao
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado4/12/2023
Ultima modificacao2/13/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernel
Fraquezas (CWE)
CWE-416CWE-416
Referencias
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28(cve-coordination@google.com)
https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28(cve-coordination@google.com)
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html(cve-coordination@google.com)
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html(cve-coordination@google.com)
https://security.netapp.com/advisory/ntap-20230601-0001/(cve-coordination@google.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28(af854a3a-2127-422b-91ae-364da2661108)
https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230601-0001/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.