First published: Fri Jul 21 2023(Updated: )
A flaw in the Linux Kernel found. A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f</a>
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6<6.5 | |
Linux Linux kernel | =6.5-rc1 | |
F5 Traffix SDC | =5.2.0=5.1.0 | 5.2.0 |
Linux Linux kernel | >=2.6.12<4.14.322 | |
Linux Linux kernel | >=4.15<4.19.291 | |
Linux Linux kernel | >=4.20<5.4.251 | |
Linux Linux kernel | >=5.5<5.10.188 | |
Linux Linux kernel | >=5.11<5.15.121 | |
Linux Linux kernel | >=5.16<6.1.40 | |
Linux Linux kernel | >=6.2<6.4.5 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
redhat/Kernel | <6.5 | 6.5 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.