Linux Kernel Use-After-Free Vuln Could lead to Privilege Escalation, Malware Attacks
A use-after-free vulnerability (CVE-2023-1829) has been discovered in the Linux Kernel traffic control index filter (tcindex). It was discovered that the tcindex_delete function does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure, which can later lead to double freeing the structure.
A local attacker can use this vulnerability to elevate their privileges to root, potentially resulting in unauthorized access, data theft, malware installation, or system damage.
With a low attack complexity and a high confidentiality, integrity and availability impact, it is critical that all impacted users apply the kernel updates issued but their distro(s) as soon as possible to protect against the compromise of sensitive data and damaging malware infections.
To stay on top of important updates released by the open-source programs and applications you use, be sure to register as a LinuxSecurity user, then subscribe to our Linux Advisory Watch newsletter and customize your advisories for the distro(s) you use. This will enable you to stay up-to-date on the latest, most significant issues impacting the security of your systems.
Follow @LS_Advisories on Twitter for real-time updates on advisories for your distro(s).