[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-356 --- kernel

ID: oval:org.secpod.oval:def:19500429Date: (C)2024-01-04   (M)2024-04-25
Class: PATCHFamily: unix




An integer overflow in kmalloc_reserve in the Linux kernel may allow a local user to crash the system, or in some cases obtain code execution in kernel space. A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc component can be exploited to achieve local privilege escalation.If a class with a link-sharing curve has a parent without a link-sharing curve, then init_vf will call vttree_insert on the parent, but vttree_remove will be skipped in update_vf. This leaves a dangling pointer that can cause a use-after-free.We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue.We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8

Platform:
Amazon Linux 2023
Product:
kernel
bpftool
python3-perf
perf
Reference:
ALAS2023-2023-356
CVE-2023-42752
CVE-2023-4623
CVE-2023-4921
CVE-2023-42755
CVE-2023-42753
CVE-2023-4881
CVE-2023-39189
CVE-2023-45871
CVE-2023-39193
CVE-2023-39192
CVE-2023-6176
CVE    11
CVE-2023-42753
CVE-2023-4623
CVE-2023-4921
CVE-2023-4881
...
CPE    4
cpe:/a:bpf:bpftool
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:python:python3-perf
...

© SecPod Technologies