Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-0266

Опубликовано: 13 янв. 2023
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem.

Меры по смягчению последствий

To mitigate this issue, skip loading (blacklist) the affected soundcard using modules like: blacklist soundcore blacklist snd blacklist snd_pcm blacklist snd_hda_codec_hdmi blacklist snd_hda_codec_realtek blacklist snd_hda_codec_generic blacklist snd_hda_intel blacklist snd_hda_codec blacklist snd_hda_core blacklist snd_hwdep blacklist snd_timer onto the system till we have a fix available. This can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.

How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2023:158404.04.2023
Red Hat Enterprise Linux 8kernelFixedRHSA-2023:156604.04.2023
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2023:165905.04.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionskernelFixedRHSA-2023:158804.04.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionskpatch-patchFixedRHSA-2023:159004.04.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2023:155904.04.2023
Red Hat Enterprise Linux 8.2 Telecommunications Update Servicekernel-rtFixedRHSA-2023:156004.04.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2163379ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF

EPSS

Процентиль: 4%
0.00022
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.9
ubuntu
больше 2 лет назад

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

CVSS3: 7.9
nvd
больше 2 лет назад

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.9
debian
больше 2 лет назад

A use after free vulnerability exists in the ALSA PCM package in the L ...

CVSS3: 7.8
github
больше 2 лет назад

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

EPSS

Процентиль: 4%
0.00022
Низкий

7.8 High

CVSS3

Уязвимость CVE-2023-0266