{"id":"CVE-2023-0461","details":"There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c","modified":"2026-03-14T14:53:58.186900Z","published":"2023-02-28T15:15:11.550Z","related":["ALSA-2023:2148","ALSA-2023:2458","ALSA-2023:2736","ALSA-2023:2951","SUSE-SU-2023:0749-1","SUSE-SU-2023:0749-2","SUSE-SU-2023:0774-1","SUSE-SU-2023:1608-1","SUSE-SU-2023:1609-1","SUSE-SU-2023:1710-1","SUSE-SU-2023:1800-1","SUSE-SU-2023:1811-1","SUSE-SU-2023:1892-1","SUSE-SU-2023:2371-1","SUSE-SU-2023:2384-1","SUSE-SU-2023:2405-1","SUSE-SU-2023:2416-1","SUSE-SU-2023:2423-1","SUSE-SU-2023:2425-1","SUSE-SU-2023:2431-1","SUSE-SU-2023:2443-1","SUSE-SU-2023:2448-1","SUSE-SU-2023:2455-1","SUSE-SU-2023:2468-1","SUSE-SU-2023:2646-1","SUSE-SU-2023:2809-1","SUSE-SU-2023:2871-1","SUSE-SU-2023:4735-1","SUSE-SU-2023:4784-1","SUSE-SU-2023:4882-1","SUSE-SU-2023:4883-1","SUSE-SU-2024:1039-1","SUSE-SU-2024:1097-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230331-0006/"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"type":"FIX","url":"https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.13.0"},{"fixed":"4.14.303"}]},{"events":[{"introduced":"4.19"},{"fixed":"4.19.270"}]},{"events":[{"introduced":"5.4"},{"fixed":"5.4.229"}]},{"events":[{"introduced":"5.10"},{"fixed":"5.10.163"}]},{"events":[{"introduced":"5.15"},{"fixed":"5.15.88"}]},{"events":[{"introduced":"6.0"},{"fixed":"6.0.19"}]},{"events":[{"introduced":"6.1"},{"fixed":"6.1.5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.2-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.2-rc2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0461.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}