← Voltar para CVEs
CVE-2023-3609
HIGH7.8
Descricao
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado7/21/2023
Ultima modificacao2/13/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
debian:debian_linuxlinux:linux_kernel
Fraquezas (CWE)
CWE-416CWE-416
Referencias
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html(cve-coordination@google.com)
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html(cve-coordination@google.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc(cve-coordination@google.com)
https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc(cve-coordination@google.com)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(cve-coordination@google.com)
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html(cve-coordination@google.com)
https://security.netapp.com/advisory/ntap-20230818-0005/(cve-coordination@google.com)
https://www.debian.org/security/2023/dsa-5480(cve-coordination@google.com)
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc(af854a3a-2127-422b-91ae-364da2661108)
https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230818-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5480(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.