Логотип exploitDog
bind: "CVE-2023-4207"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-4207"

Количество 12

Количество 12

ubuntu логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-4207

почти 2 года назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-4fhg-56x9-rf4r

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-05369

почти 2 года назад

Уязвимость компонента net/sched: cls_fw ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-13019

больше 1 года назад

ELSA-2023-13019: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7423

больше 1 года назад

ELSA-2023-7423: kernel security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20241008-10

9 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6583

больше 1 года назад

ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7077

больше 1 года назад

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 7.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw ...

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-4fhg-56x9-rf4r

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-05369

Уязвимость компонента net/sched: cls_fw ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 2 года назад
oracle-oval логотип
ELSA-2023-13019

ELSA-2023-13019: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7423

ELSA-2023-7423: kernel security update (IMPORTANT)

больше 1 года назад
redos логотип
ROS-20241008-10

Множественные уязвимости kernel-lt

CVSS3: 7.8
9 месяцев назад
oracle-oval логотип
ELSA-2023-6583

ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7077

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад

Уязвимостей на страницу