SB2024053114 - Use-after-free in Linux kernel
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-52879)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the apply_event_filter() function in kernel/trace/trace_events_filter.c, within the remove_subsystem(), event_enable_read(), event_enable_write(), event_filter_read() and trace_create_new_event() functions in kernel/trace/trace_events.c, within the register_event_command() function in kernel/trace/trace.h, within the tracing_open_file_tr() and tracing_release_file_tr() functions in kernel/trace/trace.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/961c4511c7578d6b8f39118be919016ec3db1c1e
- https://git.kernel.org/stable/c/a98172e36e5f1b3d29ad71fade2d611cfcc2fe6f
- https://git.kernel.org/stable/c/cbc7c29dff0fa18162f2a3889d82eeefd67305e0
- https://git.kernel.org/stable/c/2fa74d29fc1899c237d51bf9a6e132ea5c488976
- https://git.kernel.org/stable/c/2c9de867ca285c397cd71af703763fe416265706
- https://git.kernel.org/stable/c/9034c87d61be8cff989017740a91701ac8195a1d
- https://git.kernel.org/stable/c/bb32500fb9b78215e4ef6ee8b4345c5f5d7eafb4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.202
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.140
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.262
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.64
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7