A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.
A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().
We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b | Mailing List Patch |
https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b | Patch |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-12-19 14:15
Updated : 2024-02-01 18:51
NVD link : CVE-2023-6931
Mitre link : CVE-2023-6931
CVE.ORG link : CVE-2023-6931
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write