[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-127 --- kernel

ID: oval:org.secpod.oval:def:19500057Date: (C)2023-06-12   (M)2024-04-25
Class: PATCHFamily: unix




A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure during the renaming of a device

Platform:
Amazon Linux 2023
Product:
kernel
python3-perf
bpftool
perf
Reference:
ALAS2023-2023-127
CVE-2022-2196
CVE-2023-0458
CVE-2023-26545
CVE    3
CVE-2022-2196
CVE-2023-0458
CVE-2023-26545
CPE    4
cpe:/a:bpf:bpftool
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:python:python3-perf
...

© SecPod Technologies