7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
8.6%
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers
(cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a
local attacker to perform a local privilege escalation due to incorrect
handling of the existing filter, leading to a kernel information leak
issue.
Author | Note |
---|---|
Priority reason: By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation. | |
rodrigo-zaiden | the fix commits can be found split in CVE-2023-4206, CVE-2023-4207 and CVE-2023-4208. these 3 are likely to be marked as duplicated. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux-hwe | < any | UNKNOWN |
ubuntu | upstream | noarch | linux-hwe | < 6.5~rc5 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.15.0-218.229~16.04.1)available with ubuntu pro or ubuntu pro (infra-only | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-163.180 | UNKNOWN |
ubuntu | upstream | noarch | linux | < 6.5~rc5 | UNKNOWN |
ubuntu | upstream | noarch | linux | < 6.2.0-33.33 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-84.93 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-245.279)available with ubuntu pro or ubuntu pro (infra-only | UNKNOWN |
ubuntu | upstream | noarch | linux-hwe-5.4 | < 6.5~rc5 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < 5.4.0-163.180~18.04.1)available with ubuntu pro or ubuntu pro (infra-only | UNKNOWN |
access.redhat.com/security/cve/CVE-2023-4128
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128
git.kernel.org/linus/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 (6.5-rc5)
git.kernel.org/linus/76e42ae831991c828cffa8c37736ebfb831ad5ec (6.5-rc5)
git.kernel.org/linus/b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 (6.5-rc5)
launchpad.net/bugs/cve/CVE-2023-4128
lore.kernel.org/netdev/[email protected]/
nvd.nist.gov/vuln/detail/CVE-2023-4128
security-tracker.debian.org/tracker/CVE-2023-4128
ubuntu.com/security/notices/USN-6343-1
ubuntu.com/security/notices/USN-6383-1
ubuntu.com/security/notices/USN-6385-1
ubuntu.com/security/notices/USN-6386-1
ubuntu.com/security/notices/USN-6386-2
ubuntu.com/security/notices/USN-6386-3
ubuntu.com/security/notices/USN-6387-1
ubuntu.com/security/notices/USN-6387-2
ubuntu.com/security/notices/USN-6388-1
ubuntu.com/security/notices/USN-6396-1
ubuntu.com/security/notices/USN-6396-2
ubuntu.com/security/notices/USN-6396-3
ubuntu.com/security/notices/USN-6466-1
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
8.6%