Bug 2225201 (CVE-2023-3609)
| Summary: | CVE-2023-3609 kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Alex <allarkin> |
| Component: | vulnerability | Assignee: | Nobody <nobody> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | acaringi, allarkin, aolandt, bhu, chwhite, crwood, dbohanno, ddepaula, debarbos, dfreiber, drow, dvlasenk, ezulian, hkrzesin, jarod, jburrell, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jpoimboe, jshortt, jstancek, jwyatt, kernel-mgr, kpatch-maint-bot, ldoskova, lgoncalv, mvanderw, nmurray, ptalbert, rhandlin, rkeshri, rogbas, rrobaina, rvrbovsk, scweaver, tglozar, vkumar, walters, wcosta, williams, wmealing, ycote, ymankad |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Kernel 6.4-rc7 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2219411, 2225202, 2225203, 2225483, 2225484, 2225485, 2225486, 2225487, 2225488, 2225489, 2225490, 2225491, 2225492, 2225493, 2225494, 2225495, 2225496, 2225497, 2225498, 2225500, 2225501, 2225502, 2225503, 2225505, 2225506, 2225507, 2225508, 2225509, 2225510, 2226868, 2226869, 2226870, 2226872, 2226873 | ||
| Bug Blocks: | 2225185 | ||
|
Description
Alex
2023-07-24 14:28:28 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:5574 https://access.redhat.com/errata/RHSA-2023:5574 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:5621 https://access.redhat.com/errata/RHSA-2023:5621 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:5622 https://access.redhat.com/errata/RHSA-2023:5622 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:5628 https://access.redhat.com/errata/RHSA-2023:5628 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2023:5775 https://access.redhat.com/errata/RHSA-2023:5775 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:5794 https://access.redhat.com/errata/RHSA-2023:5794 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6583 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:6799 https://access.redhat.com/errata/RHSA-2023:6799 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:6813 https://access.redhat.com/errata/RHSA-2023:6813 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:6901 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2023:7077 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Advanced Update Support Via RHSA-2023:7294 https://access.redhat.com/errata/RHSA-2023:7294 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2023:7379 https://access.redhat.com/errata/RHSA-2023:7379 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2023:7370 https://access.redhat.com/errata/RHSA-2023:7370 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:7398 https://access.redhat.com/errata/RHSA-2023:7398 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:7410 https://access.redhat.com/errata/RHSA-2023:7410 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Via RHSA-2023:7417 https://access.redhat.com/errata/RHSA-2023:7417 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2023:7418 https://access.redhat.com/errata/RHSA-2023:7418 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:7431 https://access.redhat.com/errata/RHSA-2023:7431 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:7434 https://access.redhat.com/errata/RHSA-2023:7434 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2023:7539 https://access.redhat.com/errata/RHSA-2023:7539 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2023:7558 https://access.redhat.com/errata/RHSA-2023:7558 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Advanced Update Support Via RHSA-2024:0999 https://access.redhat.com/errata/RHSA-2024:0999 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1250 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:1253 https://access.redhat.com/errata/RHSA-2024:1253 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1306 |