There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIGTLS or CONFIGXFRM_ESPINTCP has to be configured, but the operation does not require any privilege.
There is a use-after-free bug of icskulpdata of a struct inetconnectionsock.
When CONFIGTLS is enabled, user can install a tls context (struct tlscontext) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.
The setsockopt TCP_ULP operation does not require any privilege.
We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
[
{
"target": {
"function": "__tcp_set_ulp",
"file": "net/ipv4/tcp_ulp.c"
},
"id": "CVE-2023-0461-034cec9a",
"deprecated": false,
"digest": {
"length": 412.0,
"function_hash": "9492001554419353783193665064453594626"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@2c02d41d71f90a5168391b6a5f2954112ba2307c",
"signature_version": "v1"
},
{
"target": {
"function": "inet_csk_listen_start",
"file": "net/ipv4/inet_connection_sock.c"
},
"id": "CVE-2023-0461-593f17bd",
"deprecated": false,
"digest": {
"length": 661.0,
"function_hash": "111445574614300356413262582664375373464"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@2c02d41d71f90a5168391b6a5f2954112ba2307c",
"signature_version": "v1"
},
{
"target": {
"file": "net/ipv4/tcp_ulp.c"
},
"id": "CVE-2023-0461-59e10fb7",
"deprecated": false,
"digest": {
"line_hashes": [
"43515258375016486484923143513926883572",
"5698033511481569342163974053483992400",
"327036311859908056004118432945485222244"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@2c02d41d71f90a5168391b6a5f2954112ba2307c",
"signature_version": "v1"
},
{
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"id": "CVE-2023-0461-ec245cc4",
"deprecated": false,
"digest": {
"line_hashes": [
"260979617347107948356690361349378270267",
"52831001134939302939474696092950627784",
"64857670239591481841292983759311706365",
"274548508251208668669787278357057178621",
"192684869804280146565538332306133183081",
"153017651082369262991253433561223491001",
"334145165812326296139547932903829130120",
"208773525392620728142913763048345260331"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@2c02d41d71f90a5168391b6a5f2954112ba2307c",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0461.json"