[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2024-2443 --- kernel

ID: oval:org.secpod.oval:def:1702114Date: (C)2024-02-28   (M)2024-04-25
Class: PATCHFamily: unix




An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 ; While creating a new netfilter table, lack of a safeguard against invalid nf_tables family values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access. A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system. A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group.We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b

Platform:
Amazon Linux 2
Product:
kernel
perf
python-perf
Reference:
ALAS2-2024-2443
CVE-2023-6040
CVE-2023-6546
CVE-2023-6931
CVE    3
CVE-2023-6931
CVE-2023-6040
CVE-2023-6546
CPE    4
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:python-perf:python-perf
cpe:/o:amazon:linux:2
...

© SecPod Technologies