[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2KERNEL-5.15-2023-027 --- kernel

ID: oval:org.secpod.oval:def:1701809Date: (C)2023-10-26   (M)2024-04-25
Class: PATCHFamily: unix




A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc component can be exploited to achieve local privilege escalation.If a class with a link-sharing curve has a parent without a link-sharing curve, then init_vf will call vttree_insert on the parent, but vttree_remove will be skipped in update_vf. This leaves a dangling pointer that can cause a use-after-free.We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue.We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8

Platform:
Amazon Linux 2
Product:
kernel
perf
python-perf
bpftool
Reference:
ALAS2KERNEL-5.15-2023-027
CVE-2023-4623
CVE-2023-4921
CVE-2023-42755
CVE-2023-45871
CVE-2023-39193
CVE-2023-39192
CVE    6
CVE-2023-4623
CVE-2023-4921
CVE-2023-45871
CVE-2023-39192
...
CPE    5
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:python-perf:python-perf
cpe:/o:amazon:linux:2
...

© SecPod Technologies