CVE-2023-4623Use After Free in Kernel

CWE-416Use After Free25 documents9 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 6
Latest updateNov 28

Description

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c570

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5linux/kernel2.6.126.6
NVDlinux/linux_kernel2.6.124.14.327+7
Debianlinux/linux_kernel< 5.10.197-1+3

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j8c5-g64v-xj97: A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local priv2023-09-06
CVEList
Use-after-free in Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component2023-09-06
OSV
CVE-2023-4623: A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local priv2023-09-06

📋Vendor Advisories

20
Ubuntu
Kernel Live Patch Security Notice2023-11-28
Ubuntu
Linux kernel (NVIDIA) vulnerabilities2023-10-31
Ubuntu
Linux kernel vulnerabilities2023-10-30
Ubuntu
Linux kernel vulnerabilities2023-10-30
Ubuntu
Linux kernel (Oracle) vulnerabilities2023-10-26

💬Community

1
Bugzilla
CVE-2023-4623 kernel: net/sched: sch_hfsc UAF2023-09-06
CVE-2023-4623 — Use After Free in Linux Kernel | cvebase