ID: CVE-2023-1281

Last Modified: April 12, 2023

Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.

Twitter Activity

Tweets last week: 0

Remaining steady

Yahoo Activity

Yahoo results: 457000

Remaining steady

EPSS History

Current EPSS Score: 0.00042

Remaining steady


Reddit Activity

Reddit Posts: 1

Remaining steady

Github Repos

Github Repos: 0

Remaining steady

Exploits

Found exploits:

Attack Vector: Local

Attack Complexity: Low

Privileges Required: Low

User Interaction: None

Scope: Unchanged

Confidentiality: High

Integrity: High

Availability: High

Base Score: 7.8

Exploitability Score: 1.8

Impact Score: 5.9

CVSS V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Specialize CVSS-Score

CWE-416

Condition Configuration
OR
OR
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Alle Schwachstellen für linux
Date: March 24, 2023

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*



Date: April 12, 2023

Description: Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
Reference:
added:
http://www.openwall.com/lists/oss-security/2023/04/11/3



Date: April 27, 2023

Reference:
added:
https://security.netapp.com/advisory/ntap-20230427-0004/



Date: May 3, 2023

Reference:
added:
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html



Date: May 3, 2023

Reference:
added:
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>