ALAS2023-2023-356 --- kernelID: oval:org.secpod.oval:def:19500429 | Date: (C)2024-01-04 (M)2024-05-29 |
Class: PATCH | Family: unix |
An integer overflow in kmalloc_reserve in the Linux kernel may allow a local user to crash the system, or in some cases obtain code execution in kernel space. A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc component can be exploited to achieve local privilege escalation.If a class with a link-sharing curve has a parent without a link-sharing curve, then init_vf will call vttree_insert on the parent, but vttree_remove will be skipped in update_vf. This leaves a dangling pointer that can cause a use-after-free.We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue.We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8
Platform: |
Amazon Linux 2023 |
Product: |
kernel |
bpftool |
python3-perf |
perf |