Vulnerabilities > CVE-2023-4128 - Use After Free vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2225511
- https://lore.kernel.org/netdev/[email protected]/
- https://access.redhat.com/security/cve/CVE-2023-4128
- https://lists.fedoraproject.org/archives/list/[email protected]/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
- https://www.debian.org/security/2023/dsa-5480
- https://www.debian.org/security/2023/dsa-5492
- https://access.redhat.com/errata/RHSA-2023:5238
- https://access.redhat.com/errata/RHSA-2023:5235
- https://access.redhat.com/errata/RHSA-2023:5589
- https://access.redhat.com/errata/RHSA-2023:5548
- https://access.redhat.com/errata/RHSA-2023:5603
- https://access.redhat.com/errata/RHSA-2023:5575
- https://access.redhat.com/errata/RHSA-2023:5588
- https://access.redhat.com/errata/RHSA-2023:5627
- https://access.redhat.com/errata/RHSA-2023:5604
- https://access.redhat.com/errata/RHSA-2023:5628
- https://access.redhat.com/errata/RHSA-2023:5580
- http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
- https://access.redhat.com/errata/RHSA-2023:5775
- https://access.redhat.com/errata/RHSA-2023:5794
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://security.netapp.com/advisory/ntap-20231027-0002/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81
- https://access.redhat.com/errata/RHSA-2023:6583