[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-330 --- kernel

ID: oval:org.secpod.oval:def:19500387Date: (C)2024-01-04   (M)2024-04-25
Class: PATCHFamily: unix




A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. A buffer overrun vulnerability was found in the netback driver in Xen due to an unusual split packet. This flaw allows an unprivileged guest to cause a denial of service of the host by sending network packets to the backend, causing the backend to crash. A flaw was found in the Linux kernel's IP framework for transforming packets . This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params, leading to a possible kernel crash and denial of service. A flaw was found in the Linux kernel's IP framework for transforming packets . This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace. A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system. A use-after-free flaw was found in net/sched/cls_fw.c in classifiers in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 , - 66b2c338adce , pass "inode- greater than i_uid" to sock_init_data_uid as the last parameter and that turns out to not be accurate. A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack

Platform:
Amazon Linux 2023
Product:
kernel
python3-perf
bpftool
perf
Reference:
ALAS2023-2023-330
CVE-2023-20588
CVE-2023-34319
CVE-2023-3772
CVE-2023-3773
CVE-2023-4004
CVE-2023-4206
CVE-2023-4207
CVE-2023-4208
CVE-2023-4147
CVE-2023-4194
CVE-2023-4273
CVE-2023-4569
CVE-2023-4622
CVE-2023-4015
CVE-2023-39194
CVE-2023-3777
CVE    16
CVE-2023-3773
CVE-2023-4147
CVE-2023-4569
CVE-2023-3772
...
CPE    4
cpe:/a:perf:perf
cpe:/a:bpf:bpftool
cpe:/o:linux:linux_kernel
cpe:/a:python:python3-perf
...

© SecPod Technologies