Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2023-4206

Public on 2023-09-06
Modified on 2024-01-12
Description

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.

When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

Severity
Important
See what this means
CVSS v3 Base Score
7.8
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 1 kernel 2023-09-13 23:15 ALAS-2023-1827
Amazon Linux 2 - Core kernel 2023-09-27 22:48 ALAS2-2023-2268
Amazon Linux 2 - Kernel-5.10 Extra kernel 2023-08-31 22:50 ALAS2KERNEL-5.10-2023-039
Amazon Linux 2 - Kernel-5.15 Extra kernel 2023-08-31 22:46 ALAS2KERNEL-5.15-2023-026
Amazon Linux 2 - Kernel-5.4 Extra kernel 2023-09-27 22:59 ALAS2KERNEL-5.4-2023-054
Amazon Linux 2023 kernel 2023-08-31 21:45 ALAS2023-2023-330
Amazon Linux 2 - Livepatch Extra kernel-livepatch-4.14.320-243.544 2023-10-31 00:16 ALAS2LIVEPATCH-2023-154
Amazon Linux 2 - Livepatch Extra kernel-livepatch-5.10.186-179.751 2023-10-31 00:16 ALAS2LIVEPATCH-2023-155

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD CVSSv3 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H