CVE-2023-1829
Use-after-free in tcindex (traffic control index filter) in the Linux Kernel
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege escalation.
This vulnerability allows local attackers to escalate privileges on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the tcindex module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-04-04 CVE Reserved
- 2023-04-12 CVE Published
- 2023-07-07 EPSS Updated
- 2024-02-28 First Exploit
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-416: Use After Free
CAPEC
- CAPEC-233: Privilege Escalation
References (8)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20230601-0001 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/lanleft/CVE-2023-1829 | 2024-02-28 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-1829 | 2023-11-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2188470 | 2023-11-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 4.14.308 Search vendor "Linux" for product "Linux Kernel" and version " < 4.14.308" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.15 < 4.19.276 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.15 < 4.19.276" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.20 < 5.4.235 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.20 < 5.4.235" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.5 < 5.10.173 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 5.10.173" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.11 < 5.15.100 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.11 < 5.15.100" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.16 < 6.1.18 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.16 < 6.1.18" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.2 < 6.2.5 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.2 < 6.2.5" | - |
Affected
|