[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2KERNEL-5.10-2024-052 --- kernel

ID: oval:org.secpod.oval:def:1702215Date: (C)2024-05-09   (M)2024-05-29
Class: PATCHFamily: unix




A flaw was found in the smb client in the Linux kernel. A potential out-of-bounds error was seen in the smb2_parse_contexts function. Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts. A vulnerability was discovered in the Linux kernel's IPv4 networking stack. Under certain conditions, MPTCP and NetLabel can be configured in a way that triggers a double free memory error in net/ipv4/af_inet.c:inet_sock_destruct. This may lead to a system crash, denial of service, or potential arbitrary code execution. In the Linux kernel, the following vulnerability has been resolved:ext4: regenerate buddy after block freeing failed if under fc replayThis mostly reverts commit 6bd97bf273bd and reintroduces mb_regenerate_buddy. Based oncode in mb_free_blocks, fast commit replay can end up marking as freeblocks that are already marked as such. This causes corruption of thebuddy bitmap so we need to regenerate it in that case

Platform:
Amazon Linux 2
Product:
kernel
perf
python-perf
bpftool
Reference:
ALAS2KERNEL-5.10-2024-052
CVE-2023-52434
CVE-2024-1627
CVE-2024-26601
CVE    2
CVE-2024-26601
CVE-2023-52434

© SecPod Technologies