[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2LIVEPATCH-2023-149 --- kernel-livepatch-5.10.192-183.736

ID: oval:org.secpod.oval:def:1701894Date: (C)2023-11-24   (M)2024-05-09
Class: PATCHFamily: unix




A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc component can be exploited to achieve local privilege escalation.If a class with a link-sharing curve has a parent without a link-sharing curve, then init_vf will call vttree_insert on the parent, but vttree_remove will be skipped in update_vf. This leaves a dangling pointer that can cause a use-after-free.We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue.We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8

Platform:
Amazon Linux 2
Product:
kernel-livepatch-5.10.192-183.736
Reference:
ALAS2LIVEPATCH-2023-149
CVE-2023-4623
CVE-2023-4921
CVE    2
CVE-2023-4623
CVE-2023-4921
CPE    1
cpe:/o:amazon:linux:2

© SecPod Technologies