CVE-2023-32269Use After Free in Kernel

CWE-416Use After Free43 documents7 sources
Severity
6.7MEDIUMNVD
OSV6.5OSV5.5OSV4.7
EPSS
0.0%
top 98.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 5
Latest updateSep 19

Description

An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages10 packages

NVDlinux/linux_kernel< 6.1.11
Debianlinux/linux_kernel< 5.10.178-1+3
Ubuntulinux/linux_kernel< 4.15.0-211.222+3
debiandebian/linux< linux 6.1.11-1 (bookworm)

Patches

🔴Vulnerability Details

21
OSV
linux-oem-6.0 vulnerabilities2023-09-19
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2023-09-19
OSV
linux-iot vulnerabilities2023-07-27
OSV
linux-xilinx-zynqmp vulnerabilities2023-07-12
OSV
linux-intel-iotg vulnerabilities2023-06-01

📋Vendor Advisories

21
Ubuntu
Linux kernel vulnerabilities2023-09-19
Ubuntu
Linux kernel (OEM) vulnerabilities2023-09-19
Ubuntu
Linux kernel (IoT) vulnerabilities2023-07-27
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2023-07-12
Ubuntu
Linux kernel vulnerabilities2023-06-01
CVE-2023-32269 — Use After Free in Linux Kernel | cvebase