CVE-2023-3609

HIGH

Linux kernel - Use After Free

Title source: llm
STIX 2.1

Description

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

Exploits (1)

nomisec WORKING POC
by Jturnxd · poc
https://github.com/Jturnxd/CVE-2023-3609

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-416
Status published
Products (4)
debian/debian_linux 10.0
debian/debian_linux 11.0
linux/linux_kernel 6.4 rc1 (6 CPE variants)
linux/linux_kernel 4.14 - 6.4
Published Jul 21, 2023
Tracked Since Feb 18, 2026