Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2023-1281: Important: kernel security and bug fix update (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2023-1281: Important: kernel security and bug fix update (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/22/2023
Created
08/10/2023
Added
08/09/2023
Modified
08/09/2023

Description

Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.

Solution(s)

  • centos-upgrade-kernel
  • centos-upgrade-kernel-rt
  • centos-upgrade-kpatch-patch-4_18_0-477_10_1
  • centos-upgrade-kpatch-patch-4_18_0-477_10_1-debuginfo
  • centos-upgrade-kpatch-patch-4_18_0-477_10_1-debugsource
  • centos-upgrade-kpatch-patch-4_18_0-477_13_1
  • centos-upgrade-kpatch-patch-4_18_0-477_13_1-debuginfo
  • centos-upgrade-kpatch-patch-4_18_0-477_13_1-debugsource
  • centos-upgrade-kpatch-patch-4_18_0-477_15_1
  • centos-upgrade-kpatch-patch-4_18_0-477_15_1-debuginfo
  • centos-upgrade-kpatch-patch-4_18_0-477_15_1-debugsource

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;