This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3403-1 | linux security update |
Debian DLA |
DLA-3404-1 | linux-5.10 security update |
EUVD |
EUVD-2023-23548 | Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. |
Ubuntu USN |
USN-5977-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5978-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6024-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6025-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6027-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6029-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6030-1 | Linux kernel (Qualcomm Snapdragon) vulnerabilities |
Ubuntu USN |
USN-6031-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6040-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6057-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6093-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6134-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6222-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-6256-1 | Linux kernel (IoT) vulnerabilities |
Wed, 05 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. | Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. |
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-03-05T19:22:29.884Z
Reserved: 2023-03-08T20:18:23.204Z
Link: CVE-2023-1281
Updated: 2024-08-02T05:40:59.846Z
Status : Modified
Published: 2023-03-22T14:15:16.090
Modified: 2025-02-13T17:15:58.023
Link: CVE-2023-1281
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN