Lucene search

K
nvd[email protected]NVD:CVE-2023-0461
HistoryFeb 28, 2023 - 3:15 p.m.

CVE-2023-0461

2023-02-2815:15:11
CWE-416
web.nvd.nist.gov
1
linux
kernel
vulnerability
local privilege escalation
use-after-free
config_tls
config_xfrm_espintcp
tcp socket
struct inet_connection_sock
tls context
setsockopt operation
upgrade
cve-2023-0461

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.

There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.

When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.

The setsockopt TCP_ULP operation does not require any privilege.

We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

Affected configurations

NVD
Node
linuxlinux_kernelRange4.13.04.14.303
OR
linuxlinux_kernelRange4.194.19.270
OR
linuxlinux_kernelRange5.45.4.229
OR
linuxlinux_kernelRange5.105.10.163
OR
linuxlinux_kernelRange5.155.15.88
OR
linuxlinux_kernelRange6.06.0.19
OR
linuxlinux_kernelRange6.16.1.5
OR
linuxlinux_kernelMatch6.2rc1
OR
linuxlinux_kernelMatch6.2rc2

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%