CVE-2023-3776

Updated: 2023-09-10 20:27:53.246009

Description:

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Needs Triage 2023-08-01 00:24:24
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Needs Triage 2023-09-18 17:14:02
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2023:1693426883 2023-08-30 17:06:29
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2023:1693424916 2023-08-30 17:06:29
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH In Testing 2023-09-19 11:08:52
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Needs Triage 2023-08-01 00:24:25
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Released CLSA-2023:1693329914 2023-08-29 14:08:45
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Released CLSA-2023:1693333574 2023-08-29 17:06:33
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Released CLSA-2023:1693432495 2023-08-30 21:08:46