Linux Kernel is vulnerable to Use-After-Free. A bug available in ‘icsk_ulp_data’ of ‘inet_connection_sock’. If ‘CONFIG_TLS’ is enabled, an attacker could install a tls context leading to privilege escalation.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0461
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
lists.debian.org/debian-lts-announce/2023/05/msg00005.html
lists.debian.org/debian-lts-announce/2023/05/msg00006.html