CVE-2023-0461
CVSS V2 None
CVSS V3 None
Description
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
Overview
- CVE ID
- CVE-2023-0461
- Assigner
- cve-coordination@google.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-28T15:15:11
- Last Modified Date
- 2023-03-10T04:57:39
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 1 | OR | 6.2 | |
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c | Mailing List Patch |
https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c | Patch |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0461 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 05:39:53 | Added to TrackCVE | |||
2023-04-17 05:39:55 | Weakness Enumeration | new |