Updated: 2023-09-10 20:27:53.246009
Description:
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | HIGH | 7.8 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
CentOS 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Needs Triage | 2023-08-01 00:24:24 | |
CentOS 7 ELS | kernel | 3.10.0 | 7.8 | HIGH | Needs Triage | 2023-09-18 17:14:02 | |
CentOS 8.4 ELS | kernel | 4.18.0 | 7.8 | HIGH | Released | CLSA-2023:1693426883 | 2023-08-30 17:06:29 |
CentOS 8.5 ELS | kernel | 4.18.0 | 7.8 | HIGH | Released | CLSA-2023:1693424916 | 2023-08-30 17:06:29 |
CloudLinux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | In Testing | 2023-09-19 11:08:52 | |
Oracle Linux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Needs Triage | 2023-08-01 00:24:25 | |
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.8 | HIGH | Released | CLSA-2023:1693329914 | 2023-08-29 14:08:45 |
Ubuntu 16.04 ELS | linux | 4.4.0 | 7.8 | HIGH | Released | CLSA-2023:1693333574 | 2023-08-29 17:06:33 |
Ubuntu 18.04 ELS | linux | 4.15.0 | 7.8 | HIGH | Released | CLSA-2023:1693432495 | 2023-08-30 21:08:46 |