Логотип exploitDog
bind: "CVE-2023-4206"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-4206"

Количество 12

Количество 12

ubuntu логотип

CVE-2023-4206

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-4206

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-4206

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-4206

почти 2 года назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-4206

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_ro ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-r8pm-459q-x6hw

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-05391

почти 2 года назад

Уязвимость функции route4_change() в модуле net/sched/cls_route.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-7423

больше 1 года назад

ELSA-2023-7423: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12842

больше 1 года назад

ELSA-2023-12842: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20241008-10

9 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6583

больше 1 года назад

ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7077

больше 1 года назад

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-4206

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-4206

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4206

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 7.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-4206

A use-after-free vulnerability in the Linux kernel's net/sched: cls_ro ...

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-r8pm-459q-x6hw

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-05391

Уязвимость функции route4_change() в модуле net/sched/cls_route.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 2 года назад
oracle-oval логотип
ELSA-2023-7423

ELSA-2023-7423: kernel security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2023-12842

ELSA-2023-12842: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
redos логотип
ROS-20241008-10

Множественные уязвимости kernel-lt

CVSS3: 7.8
9 месяцев назад
oracle-oval логотип
ELSA-2023-6583

ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7077

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад

Уязвимостей на страницу