[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2LIVEPATCH-2023-137 --- kernel-livepatch-5.10.179-171.711

ID: oval:org.secpod.oval:def:1701554Date: (C)2023-09-01   (M)2024-04-25
Class: PATCHFamily: unix




A flaw was found in the Linux kernel's networking subsystem within the RPL protocol's handling. This issue results from the improper handling of user-supplied data, which can lead to an assertion failure. This flaw allows an unauthenticated, remote attacker to create a denial of service condition on the system. A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.The out-of-bounds write is caused by missing skb- greater than cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e. An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation

Platform:
Amazon Linux 2
Product:
kernel-livepatch-5.10.179-171.711
Reference:
ALAS2LIVEPATCH-2023-137
CVE-2023-2156
CVE-2023-3090
CVE-2023-35788
CVE    3
CVE-2023-35788
CVE-2023-3090
CVE-2023-2156

© SecPod Technologies