CVE-2023-1829 — Use After Free in Kernel
Severity
7.8HIGHNVD
OSV7.0OSV5.5OSV4.7
EPSS
0.2%
top 54.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 12
Latest updateAug 19
Description
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages12 packages
Patches
🔴Vulnerability Details
16GHSA▶
GHSA-4x82-r4q4-7g8x: A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation↗2023-07-06
📋Vendor Advisories
18📄Research Papers
2💬Community
1Bugzilla▶
CVE-2023-1829 kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter↗2023-04-20