Описание
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP1)
This update for the Linux Kernel 4.12.14-150100_197_157 fixes several issues.
The following security issues were fixed:
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215440).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209683).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP1
Ссылки
- Link for SUSE-SU-2023:4280-1
- E-Mail link for SUSE-SU-2023:4280-1
- SUSE Security Ratings
- SUSE Bug 1209683
- SUSE Bug 1210619
- SUSE Bug 1215440
- SUSE CVE CVE-2023-1281 page
- SUSE CVE CVE-2023-1829 page
- SUSE CVE CVE-2023-4623 page
Описание
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
Затронутые продукты
Ссылки
- CVE-2023-1281
- SUSE Bug 1209634
- SUSE Bug 1209683
- SUSE Bug 1210335
- SUSE Bug 1210423
- SUSE Bug 1211833
Описание
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
Затронутые продукты
Ссылки
- CVE-2023-1829
- SUSE Bug 1210335
- SUSE Bug 1210619
- SUSE Bug 1217444
- SUSE Bug 1217531
- SUSE Bug 1220886
- SUSE Bug 1228311
Описание
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
Затронутые продукты
Ссылки
- CVE-2023-4623
- SUSE Bug 1215115
- SUSE Bug 1215440
- SUSE Bug 1217444
- SUSE Bug 1217531
- SUSE Bug 1219698
- SUSE Bug 1221578
- SUSE Bug 1221598