CVE-2023-1281Use After Free in Kernel

Severity
7.8HIGHNVD
OSV8.8OSV6.7OSV5.5OSV4.7OSV4.6
EPSS
0.0%
top 96.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 22
Latest updateFeb 14

Description

Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages13 packages

NVDlinux/linux_kernel4.145.10.169+3
Debianlinux/linux_kernel< 5.10.178-1+3
Ubuntulinux/linux_kernel< 4.15.0-209.220+5
CVEListV5linux/linux_kernel4.146.2
debiandebian/linux< linux 6.1.15-1 (bookworm)

Patches

🔴Vulnerability Details

17
OSV
linux-iot vulnerabilities2023-07-27
OSV
linux-xilinx-zynqmp vulnerabilities2023-07-12
OSV
linux-intel-iotg-5.15 vulnerabilities2023-06-01
OSV
linux-bluefield vulnerabilities2023-05-22
OSV
linux-intel-iotg vulnerabilities2023-05-05

📋Vendor Advisories

21
Palo Alto
PAN-SA-2024-0001 Informational Bulletin: Impact of OSS CVEs in PAN-OS2024-02-14
Red Hat
hw: Intel: execution of MOVSB instructions with redundant REX prefix leads to unintended system behavior2023-11-14
Ubuntu
Linux kernel (IoT) vulnerabilities2023-07-27
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2023-07-12
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2023-06-01

💬Community

1
Bugzilla
CVE-2023-1281 kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation2023-03-26
CVE-2023-1281 — Use After Free in Linux Kernel | cvebase