A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06 | patch mailing list |
https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06 | patch |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html | third party advisory mailing list |