[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-430 --- kernel

ID: oval:org.secpod.oval:def:19500502Date: (C)2024-01-04   (M)2024-04-29
Class: PATCHFamily: unix




An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory . This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. x86: KVM: SVM: always update the x2avic msr interception A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events component can be exploited to achieve local privilege escalation.If perf_read_group is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06

Platform:
Amazon Linux 2023
Product:
kernel
bpftool
perf
python3-perf
Reference:
ALAS2023-2023-430
CVE-2023-46813
CVE-2023-5090
CVE-2023-5717
CVE-2023-46862
CVE    4
CVE-2023-46862
CVE-2023-5717
CVE-2023-5090
CVE-2023-46813
...
CPE    4
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:bpf:bpftool
cpe:/a:python:python3-perf
...

© SecPod Technologies