First published: Fri Jul 21 2023(Updated: )
A flaw in the Linux Kernel found. A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc</a>
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.14<6.4 | |
Linux Linux kernel | =6.4-rc1 | |
Linux Linux kernel | =6.4-rc2 | |
Linux Linux kernel | =6.4-rc3 | |
Linux Linux kernel | =6.4-rc4 | |
Linux Linux kernel | =6.4-rc5 | |
Linux Linux kernel | =6.4-rc6 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
redhat/Kernel | <6.4 | 6.4 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.