ALAS2023-2023-430 --- kernelID: oval:org.secpod.oval:def:19500502 | Date: (C)2024-01-04 (M)2024-04-29 |
Class: PATCH | Family: unix |
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory . This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. x86: KVM: SVM: always update the x2avic msr interception A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events component can be exploited to achieve local privilege escalation.If perf_read_group is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06
Platform: |
Amazon Linux 2023 |
Product: |
kernel |
bpftool |
perf |
python3-perf |