CVE-2023-4207

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-4207
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4207.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-4207
Downstream
Related
Published
2023-09-06T14:15:11Z
Modified
2025-08-09T19:01:26Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.

When fwchange() is called on an existing filter, the whole tcfresult struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcfunbindfilter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

References

Affected packages