[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2023-1773 --- kernel

ID: oval:org.secpod.oval:def:1601729Date: (C)2023-07-10   (M)2024-05-04
Class: PATCHFamily: unix




A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation. A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system. A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component. do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition . A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance before calling btrfs_ioctl_defrag. An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset

Platform:
Amazon Linux AMI
Product:
kernel
perf
Reference:
ALAS-2023-1773
CVE-2022-2586
CVE-2022-34918
CVE-2023-2269
CVE-2023-28466
CVE-2023-3111
CVE-2023-34256
CVE-2024-0775
CVE    7
CVE-2023-28466
CVE-2023-2269
CVE-2023-3111
CVE-2022-34918
...
CPE    3
cpe:/o:amazon:linux
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf

© SecPod Technologies