A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3403-1 | linux security update |
Debian DLA |
DLA-3404-1 | linux-5.10 security update |
EUVD |
EUVD-2023-24031 | A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. |
Ubuntu USN |
USN-6033-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6043-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6044-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6045-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6047-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-6051-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6052-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-6058-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-6069-1 | Linux kernel (Raspberry Pi) vulnerability |
Ubuntu USN |
USN-6070-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6071-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6072-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6093-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6107-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6133-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6134-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6222-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-6256-1 | Linux kernel (IoT) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. | A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. |
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:39:39.975Z
Reserved: 2023-04-04T10:32:43.055Z
Link: CVE-2023-1829
Updated: 2024-08-02T06:05:26.153Z
Status : Modified
Published: 2023-04-12T12:15:07.080
Modified: 2025-02-13T17:16:00.420
Link: CVE-2023-1829
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN