Описание
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | fixed | 6.1.4-1 | package | |
linux | fixed | 5.10.178-1 | bullseye | package |
Примечания
https://lore.kernel.org/all/20221006152643.1694235-1-zyytlz.wz@163.com/
https://git.kernel.org/linus/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc
SGI_GRU not enabled in any Debian kernel
EPSS
Связанные уязвимости
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)
Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)
EPSS