Логотип exploitDog
bind:CVE-2023-4208
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-4208

Количество 12

Количество 12

ubuntu логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-4208

почти 2 года назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-ph8p-rrmj-8gf2

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-05390

почти 2 года назад

Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-12970

больше 1 года назад

ELSA-2023-12970: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7423

больше 1 года назад

ELSA-2023-7423: kernel security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20241008-10

9 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6583

больше 1 года назад

ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7077

больше 1 года назад

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 7.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ...

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-ph8p-rrmj-8gf2

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-05390

Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 2 года назад
oracle-oval логотип
ELSA-2023-12970

ELSA-2023-12970: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7423

ELSA-2023-7423: kernel security update (IMPORTANT)

больше 1 года назад
redos логотип
ROS-20241008-10

Множественные уязвимости kernel-lt

CVSS3: 7.8
9 месяцев назад
oracle-oval логотип
ELSA-2023-6583

ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7077

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад

Уязвимостей на страницу