跳转到帖子

Rocky Linux: CVE-2023-3610: kernel-rt (RLSA-2023-5091)

recommended_posts

发布于
  • Members

Rocky Linux: CVE-2023-3610: kernel-rt (RLSA-2023-5091)

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
07/21/2023
Created
03/07/2024
Added
03/05/2024
Modified
01/30/2025

Description

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.

Solution(s)

  • rocky-upgrade-kernel-rt
  • rocky-upgrade-kernel-rt-core
  • rocky-upgrade-kernel-rt-debug
  • rocky-upgrade-kernel-rt-debug-core
  • rocky-upgrade-kernel-rt-debug-debuginfo
  • rocky-upgrade-kernel-rt-debug-devel
  • rocky-upgrade-kernel-rt-debug-kvm
  • rocky-upgrade-kernel-rt-debug-modules
  • rocky-upgrade-kernel-rt-debug-modules-core
  • rocky-upgrade-kernel-rt-debug-modules-extra
  • rocky-upgrade-kernel-rt-debuginfo
  • rocky-upgrade-kernel-rt-devel
  • rocky-upgrade-kernel-rt-kvm
  • rocky-upgrade-kernel-rt-modules
  • rocky-upgrade-kernel-rt-modules-core
  • rocky-upgrade-kernel-rt-modules-extra

References

  • https://attackerkb.com/topics/cve-2023-3610
  • CVE - 2023-3610
  • https://errata.rockylinux.org/RLSA-2023:5091
  • 查看数 700
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…