CVE-2023-0461

CVSS V2 None CVSS V3 None
Description
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
Overview
  • CVE ID
  • CVE-2023-0461
  • Assigner
  • cve-coordination@google.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-02-28T15:15:11
  • Last Modified Date
  • 2023-03-10T04:57:39
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 6.2
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2023-04-17 05:39:53 Added to TrackCVE
2023-04-17 05:39:55 Weakness Enumeration new