[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-070 --- kernel

ID: oval:org.secpod.oval:def:19500119Date: (C)2023-06-12   (M)2024-05-16
Class: PATCHFamily: unix




2023-05-11: CVE-2023-2019 was added to this advisory.A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system. AMD recommends using a software mitigation for this issue, which the kernel is enabling by default. The Linux kernel will use the generic retpoline software mitigation, instead of the specialized AMD one, on AMD instances . This is done by default, and no administrator action is needed. AMD recommends using a software mitigation for this issue, which the kernel is enabling by default. The Linux kernel will use the generic retpoline software mitigation, instead of the specialized AMD one, on AMD instances . This is done by default, and no administrator action is needed. Non-transparent sharing of branch predictor selectors between contexts in some Intel Processors may allow an authorized user to potentially enable information disclosure. Non-transparent sharing of branch predictor within a context in some Intel Processors may allow an authorized user to potentially enable information disclosure via local access. A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization . A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged local user able to open a filesystem that does not support the Filesystem Context API could use this flaw to escalate their privileges on the system. The cgroup release_agent is called with call_usermodehelper. The function call_usermodehelper starts the release_agent with a full set of capabilities. Therefore require capabilities when setting the release_agent. A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege to create issues with confidentiality. A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel's BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system. A memory leak flaw was found in the Linux kernel's ICMPv6 networking protocol, in the way a user generated malicious ICMPv6 packets.This flaw allows a remote user to crash the system. A flaw was found in the way the flags member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space. A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue. A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle return with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. A use-after-free vulnerability was found in the tc_new_tfilter function in net/sched/cls_api.c in the Linux kernel. The availability of local, unprivileged user namespaces allows privilege escalation. When the KVM updates the guest's page table entry, it will first use get_user_pages_fast to pin the page, and when it fails , it will get corresponding VMA where the page lies in through find_vma_intersection, calculate the physical address, and map the page to the kernel virtual address through memremap, and finally, write the update.The problem is that when we get the vma through find_vma_intersection, only VM_PFNMAP is checked, not both VM_IO and VM_PFNMAP. In the reproducer below, after the KVM_SET_USER_MEMORY_REGION is completed, we replace the guest's memory mapping with the kernel-user shared region of io_uring and then perform the KVM_TRANSLATE operation, which finally triggers the page table entry update. Now, memremap will return page_offset_base + vaddr + vm_pgoff , and use the return value as the base address for CMPXCHG . Since both vaddr and vm_pgoff are controllable by the user-mode process, writing may exceed the previously mapped guest memory space and trigger exceptions such as UAF. The vulnerability shares similarities with CVE-2021-22543. A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block in the Linux kernel's filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service. A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability. A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information. An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory. A use-after-free flaw was found in the Linux kernel's Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system. perf: Fix sys_perf_event_open race against self A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service. A NULL pointer dereference flaw was found in the Linux kernel's KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. A use-after-free vulnerability was found in the Linux kernel's Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue. No description is available for this CVE. A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem. A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse , causing a denial of service and possibly to run code. A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel Processors may allow an authenticated user to enable information disclosure via local access. A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel Processors may allow an authenticated user to enable information disclosure via local access. A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel reg; Processors may allow an authenticated user to enable information disclosure via local access. A bug in the IMA subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled A flaw was found in the Linux kernel's adjust_ptr_min_max_vals in the kernel/bpf/verifier.c function. In this flaw, a missing sanity check for *_OR_NULL pointer types that perform pointer arithmetic may cause a kernel information leak issue. A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure. The Amazon Linux kernel now enables, by default, a software mitigation for this issue, on all ARM-based EC2 instance types. drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-greater thanbuf release. An out-of-bounds memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat. A use-after-free flaw was found in the Linux kernel's POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system. A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation. A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem. A use-after-free flaw was found in the Linux kernel's Unix socket Garbage Collection and io_uring. This flaw allows a local user to crash or potentially escalate their privileges on the system. Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend . Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend . A flaw was found in hw. In certain processors with Intel's Enhanced Indirect Branch Restricted Speculation capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer prediction. A firewall flaw that can bypass the Linux kernel's Netfilter functionality was found in how a user handles unencrypted IRC with nf_conntrack_irc configured. This flaw allows a remote user to gain unauthorized access to the system. In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access. A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel Processors may allow an authorized user to enable information disclosure via local access. The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data. drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release. Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions. A use-after-free flaw was found in the Linux kernel's io_uring interface subsystem in the way a user triggers a race condition between timeout flush and removal. This flaw allows a local user to crash or escalate their privileges on the system. A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel processors may potentially allow an authorized user to enable information disclosure via local access. A race condition was found in the Linux kernel's IP framework for transforming packets when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket. The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error. A use-after-free flaw was found in io_uring in the Linux kernel. This flaw allows a local user to trigger the issue if a signalfd or binder fd is polled with the io_uring poll due to a lack of io_uring POLLFREE handling. net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free. An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER when accessing floating point registers. A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user could use this flaw to crash the system, resulting in a denial of service condition. Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend . Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend . Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend . Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend . Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend . Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend . network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP , a code label was moved in a way allowing for SKBs having references retained for further processing to nevertheless be freed. rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free. rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free. A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system. A memory access flaw was found in the Linux kernel's XEN hypervisor for the virtual machine. This flaw allows a local user to crash the system or potentially escalate their privileges on the system. An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice. A memory corruption flaw was found in the Linux kernel's Netfilter subsystem in the way a local user uses the libnetfilter_queue when analyzing a corrupted network packet. This flaw allows a local user to crash the system or a remote user to crash the system when the libnetfilter_queue is used by a local user. A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition . This issue allows a device driver to free a page while it still has stale TLB entries. A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations. An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user, a heap overflow may occur. A race condition in the Linux kernel's EFI capsule loader driver was found in the way it handled write and flush operations on the device node of the EFI capsule. A local user could potentially use this flaw to crash the system

Platform:
Amazon Linux 2023
Product:
kernel
perf
python3-perf
bpftool
Reference:
ALAS2023-2023-070
CVE-2021-26341
CVE-2021-26401
CVE-2022-0001
CVE-2022-0002
CVE-2022-0171
CVE-2022-0185
CVE-2022-0492
CVE-2022-0494
CVE-2022-0500
CVE-2022-0742
CVE-2022-0847
CVE-2022-0854
CVE-2022-1015
CVE-2022-1016
CVE-2022-1055
CVE-2022-1158
CVE-2022-1184
CVE-2022-1199
CVE-2022-1263
CVE-2022-1353
CVE-2022-1462
CVE-2022-1679
CVE-2022-1729
CVE-2022-1789
CVE-2022-1852
CVE-2022-1966
CVE-2022-1972
CVE-2022-1973
CVE-2022-2078
CVE-2022-21123
CVE-2022-21125
CVE-2022-21166
CVE-2022-21505
CVE-2022-23222
CVE-2022-23816
CVE-2022-23825
CVE-2022-23960
CVE-2022-24958
CVE-2022-25636
CVE-2022-2585
CVE-2022-2586
CVE-2022-2588
CVE-2022-2602
CVE-2022-26365
CVE-2022-26373
CVE-2022-2663
CVE-2022-27223
CVE-2022-28693
CVE-2022-28893
CVE-2022-2905
CVE-2022-29156
CVE-2022-29581
CVE-2022-29582
CVE-2022-29900
CVE-2022-29901
CVE-2022-3028
CVE-2022-30594
CVE-2022-3061
CVE-2022-3176
CVE-2022-32250
CVE-2022-32981
CVE-2022-3303
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
CVE-2022-33743
CVE-2022-3435
CVE-2022-34494
CVE-2022-34495
CVE-2022-34918
CVE-2022-3522
CVE-2022-3523
CVE-2022-3524
CVE-2022-3534
CVE-2022-3543
CVE-2022-3566
CVE-2022-3567
CVE-2022-3606
CVE-2022-36123
CVE-2022-3623
CVE-2022-3643
CVE-2022-36879
CVE-2022-36946
CVE-2022-39188
CVE-2022-39189
CVE-2022-39190
CVE-2022-39842
CVE-2022-40307
CVE-2022-4139
CVE-2022-42328
CVE-2022-42329
CVE-2022-43750
CVE-2022-4378
CVE-2022-4379
CVE-2022-43945
CVE-2022-45869
CVE-2022-4842
CVE-2023-0179
CVE-2023-0394
CVE-2023-0459
CVE-2023-0469
CVE-2023-0590
CVE-2023-2019
CVE-2023-2177
CVE-2023-3357
CVE-2022-48619
CVE-2023-4459
CVE-2024-0562
CVE-2023-26544
CVE-2023-1637
CVE-2023-4387
CVE-2023-3111
CVE-2023-0461
CVE    113
CVE-2023-2177
CVE-2022-3523
CVE-2022-39189
CVE-2023-4387
...
CPE    5
cpe:/a:bpf:bpftool
cpe:/o:linux:linux_kernel
cpe:/o:linux:linux_kernel:-
cpe:/a:perf:perf
...

© SecPod Technologies