CVE-2023-1281
UAF in Linux kernel's tcindex (traffic control index filter) implementation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.
This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-03-08 CVE Reserved
- 2023-03-22 CVE Published
- 2023-03-25 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
- CAPEC-233: Privilege Escalation
References (8)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2023/04/11/3 | Mailing List | |
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20230427-0004 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-1281 | 2023-08-08 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2181847 | 2023-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.14 < 5.10.169 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.14 < 5.10.169" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.11 < 5.15.95 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.11 < 5.15.95" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.16 < 6.1.13 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.16 < 6.1.13" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc2 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc3 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc4 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc5 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc6 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc7 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.2 Search vendor "Linux" for product "Linux Kernel" and version "6.2" | rc8 |
Affected
|