CVE-2023-4128 - Use After Free

Severity

78%

Complexity

18%

Confidentiality

98%

A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.

Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

CVSS 3.1 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Demo Examples

Use After Free

CWE-416

The following example demonstrates the weakness.


               
}
free(buf3R2);

Use After Free

CWE-416

The following code illustrates a use after free error:


               
}
free(ptr);
logError("operation aborted before commit", ptr);

When an error occurs, the pointer is immediately freed. However, this pointer is later incorrectly used in the logError function.

Overview

Type

Linux

First reported 1 year ago

2023-08-10 17:15:00

Last updated 1 year ago

2023-11-14 12:15:00

Affected Software

Linux Kernel

Red Hat Enterprise Linux (RHEL) 7.0 (7)

7.0

Red Hat Enterprise Linux 8.0

8.0

References

https://bugzilla.redhat.com/show_bug.cgi?id=2225511

https://lore.kernel.org/netdev/[email protected]/

https://access.redhat.com/security/cve/CVE-2023-4128

https://lists.fedoraproject.org/archives/list/[email protected]/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/

https://lists.fedoraproject.org/archives/list/[email protected]/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/

https://bugzilla.redhat.com/show_bug.cgi?id=2225511

Issue Tracking, Third Party Advisory

https://lore.kernel.org/netdev/[email protected]/

Exploit, Vendor Advisory

https://access.redhat.com/security/cve/CVE-2023-4128

Third Party Advisory

https://lists.fedoraproject.org/archives/list/[email protected]/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/

Mailing List, Third Party Advisory

https://lists.fedoraproject.org/archives/list/[email protected]/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/

Mailing List, Third Party Advisory

https://www.debian.org/security/2023/dsa-5480

https://www.debian.org/security/2023/dsa-5492

https://access.redhat.com/errata/RHSA-2023:5238

https://access.redhat.com/errata/RHSA-2023:5235

https://access.redhat.com/errata/RHSA-2023:5589

https://access.redhat.com/errata/RHSA-2023:5548

https://access.redhat.com/errata/RHSA-2023:5603

https://access.redhat.com/errata/RHSA-2023:5575

https://access.redhat.com/errata/RHSA-2023:5588

https://access.redhat.com/errata/RHSA-2023:5627

https://access.redhat.com/errata/RHSA-2023:5604

https://access.redhat.com/errata/RHSA-2023:5628

https://access.redhat.com/errata/RHSA-2023:5580

http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html

https://access.redhat.com/errata/RHSA-2023:5775

https://access.redhat.com/errata/RHSA-2023:5794

https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html

https://security.netapp.com/advisory/ntap-20231027-0002/

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81

RHSA-2023:6583

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.