APPLIED [OEM-5.17, OEM-6.0] Re: [SRU Focal/Jammy/OEM-5.17/Kinetic/OEM-6.0/Lunar 0/1] CVE-2023-3776
Timo Aaltonen
tjaalton at ubuntu.com
Fri Aug 4 09:44:04 UTC 2023
Cengiz Can kirjoitti 28.7.2023 klo 9.57:
> [Impact]
> A use-after-free vulnerability in the Linux kernel’s net/sched: cls_fw
> component can be exploited to achieve local privilege escalation. If
> tcf_change_indev() fails, fw_set_parms() will immediately return an error after
> incrementing or decrementing the reference counter in tcf_bind_filter(). If an
> attacker can control the reference counter and set it to zero, they can cause
> the reference to be freed, leading to a use-after-free vulnerability. We
> recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
>
> [Fix]
> Cherry picked from upstream.
>
> [Test case]
> Compile and boot tested only.
>
> [Potential regression]
> All users that utilize traffic shaping might be affected. Although highly
> unlikely.
>
> M A Ramdhan (1):
> net/sched: cls_fw: Fix improper refcount update leads to
> use-after-free
>
> net/sched/cls_fw.c | 10 +++++-----
> 1 file changed, 5 insertions(+), 5 deletions(-)
>
applied to oem-5.17, -6.0, thanks
--
t
More information about the kernel-team
mailing list