CVE-2023-4206
Linux Kernel vulnerability analysis and mitigation

Overview

A use-after-free vulnerability (CVE-2023-4206) was discovered in the Linux kernel's net/sched: cls_route component. The vulnerability was disclosed on September 6, 2023, affecting Linux kernel versions up to (excluding) 6.5. The issue occurs in the route4_change() function when updating an existing filter, where improper handling of the tcf_result struct can lead to a use-after-free condition (NVD).

Technical details

The vulnerability occurs when route4_change() is called on an existing filter, where the entire tcf_result struct is copied into the new instance of the filter. This causes an issue when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Kernel Commit).

Impact

The vulnerability can be exploited to achieve local privilege escalation. When successfully exploited, it could allow an attacker to gain elevated privileges on the system, potentially leading to unauthorized access to system resources, data theft, or system compromise (NVD).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8. The fix involves no longer copying the tcf_result struct from the old filter during updates. Various Linux distributions have released patches, including Debian in version 6.1.52-1 and Red Hat in their security updates (Kernel Commit, Debian Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt-addons
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-core
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • linux-ibm-5.15
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management