Описание
Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5)
This update for the Linux Kernel 4.12.14-122_179 fixes several issues.
The following security issues were fixed:
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209683).
Список пакетов
SUSE Linux Enterprise Live Patching 12 SP5
Ссылки
- Link for SUSE-SU-2023:4319-1
- E-Mail link for SUSE-SU-2023:4319-1
- SUSE Security Ratings
- SUSE Bug 1209683
- SUSE Bug 1210619
- SUSE CVE CVE-2023-1281 page
- SUSE CVE CVE-2023-1829 page
Описание
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
Затронутые продукты
Ссылки
- CVE-2023-1281
- SUSE Bug 1209634
- SUSE Bug 1209683
- SUSE Bug 1210335
- SUSE Bug 1210423
- SUSE Bug 1211833
Описание
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
Затронутые продукты
Ссылки
- CVE-2023-1829
- SUSE Bug 1210335
- SUSE Bug 1210619
- SUSE Bug 1217444
- SUSE Bug 1217531
- SUSE Bug 1220886
- SUSE Bug 1228311