Updated: 2025-02-13 22:53:05.456736
Description:
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | HIGH | 7.8 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | kernel | 5.14.0 | 7.8 | HIGH | Already Fixed | 2024-01-19 10:10:36 | ||
AlmaLinux 9.2 FIPS | kernel | 5.14.0 | 7.8 | HIGH | Released | CLSA-2024:1710164161 | 2024-03-11 09:55:12 | |
CentOS 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Released | CLSA-2024:1705494430 | 2024-02-05 08:32:17 | |
CentOS 7 ELS | kernel | 3.10.0 | 7.8 | HIGH | Already Fixed | 2024-03-16 04:43:28 | ||
CentOS 8.4 ELS | kernel | 4.18.0 | 7.8 | HIGH | Released | CLSA-2023:1693426883 | 2023-08-30 17:06:29 | |
CentOS 8.5 ELS | kernel | 4.18.0 | 7.8 | HIGH | Released | CLSA-2023:1693424916 | 2023-08-30 17:06:29 | |
CloudLinux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Ignored | 2024-10-09 04:14:59 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Released | CLSA-2024:1705496067 | 2024-01-17 08:44:42 | |
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.8 | HIGH | Released | CLSA-2023:1693329914 | 2023-08-29 14:08:45 | |
Ubuntu 16.04 ELS | linux | 4.4.0 | 7.8 | HIGH | Released | CLSA-2023:1693333574 | 2023-08-29 17:06:33 |