CVE-2023-3609

CVE-2023-3609 Detail





Received

This vulnerability has been received by the NVD and has not been analyzed.




Description


A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.



Severity



CVSS Version 3.x CVSS Version 2.0
CVSS 3.x Severity and Metrics:
CVSS 2.0 Severity and Metrics:



References to Advisories, Solutions, and Tools


By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].




Weakness Enumeration


CWE-ID
CWE Name
Source
CWE-416
Use After Free
Google Inc.  


Change History


0 change records found