A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b | patch mailing list |
https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b | patch |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html | third party advisory mailing list |