跳转到帖子

Red Hat: CVE-2023-4623: kernel: net/sched: sch_hfsc UAF (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-4623: kernel: net/sched: sch_hfsc UAF (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
09/06/2023
Created
01/26/2024
Added
01/25/2024
Modified
12/05/2024

Description

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-rt

References

  • CVE-2023-4623
  • RHSA-2024:0340
  • RHSA-2024:0378
  • RHSA-2024:0381
  • RHSA-2024:0386
  • RHSA-2024:0412
  • RHSA-2024:0431
  • RHSA-2024:0432
  • RHSA-2024:0439
  • RHSA-2024:0448
  • RHSA-2024:0461
  • RHSA-2024:0554
  • RHSA-2024:0575
  • RHSA-2024:0876
  • RHSA-2024:0881
  • RHSA-2024:0897
  • RHSA-2024:1960
  • RHSA-2024:2003
  • RHSA-2024:2004
View more
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…