APPLIED [OEM-5.14/OEM-5.17/OEM-6.0] Re: [UBUNTU Bionic, Focal, Jammy, Kinetic, OEM-5.14, OEM-5.17, OEM-6.0 0/1] CVE-2023-1281
Timo Aaltonen
tjaalton at ubuntu.com
Thu Mar 16 14:29:55 UTC 2023
- Previous message (by thread): ACK: [UBUNTU Bionic, Focal, Jammy, Kinetic, OEM-5.14, OEM-5.17, OEM-6.0 0/1] CVE-2023-1281
- Next message (by thread): APPLIED[B,F,J,K]: [UBUNTU Bionic, Focal, Jammy, Kinetic, OEM-5.14, OEM-5.17, OEM-6.0 0/1] CVE-2023-1281
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Thadeu Lima de Souza Cascardo kirjoitti 15.3.2023 klo 17.20:
> [Impact]
> An unprivileged user may exploit a use-after-free condition with the tcindex
> classifier, leading to possible local escalation of privilege.
>
> [Backport]
> The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
> A backport to add it was done on those branches.
>
> The tcindex classifier was removed on 6.1 and 6.2 kernels.
>
> [Potential regression]
> Only tcindex classifiers are under risk of regressions.
>
>
> Paul E. McKenney (1):
> rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
>
> Pedro Tammela (1):
> net/sched: tcindex: update imperfect hash filters respecting rcu
>
> include/linux/rcupdate.h | 18 ++++++++++++++++++
> net/sched/cls_tcindex.c | 34 ++++++++++++++++++++++++++++++----
> 2 files changed, 48 insertions(+), 4 deletions(-)
>
applied to oem kernels, thanks
--
t
- Previous message (by thread): ACK: [UBUNTU Bionic, Focal, Jammy, Kinetic, OEM-5.14, OEM-5.17, OEM-6.0 0/1] CVE-2023-1281
- Next message (by thread): APPLIED[B,F,J,K]: [UBUNTU Bionic, Focal, Jammy, Kinetic, OEM-5.14, OEM-5.17, OEM-6.0 0/1] CVE-2023-1281
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list