vulnerability

CentOS Linux: CVE-2023-0266: Important: kernel-rt security and bug fix update (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
01/30/2023
Added
03/28/2023
Modified
01/28/2025

Description

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

Solution(s)

centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-4_18_0-425_10_1centos-upgrade-kpatch-patch-4_18_0-425_10_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-425_10_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-425_13_1centos-upgrade-kpatch-patch-4_18_0-425_13_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-425_13_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-425_3_1centos-upgrade-kpatch-patch-4_18_0-425_3_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-425_3_1-debugsourcecentos-upgrade-kpatch-patch-5_14_0-162_12_1centos-upgrade-kpatch-patch-5_14_0-162_12_1-debuginfocentos-upgrade-kpatch-patch-5_14_0-162_12_1-debugsourcecentos-upgrade-kpatch-patch-5_14_0-162_18_1centos-upgrade-kpatch-patch-5_14_0-162_18_1-debuginfocentos-upgrade-kpatch-patch-5_14_0-162_18_1-debugsourcecentos-upgrade-kpatch-patch-5_14_0-162_6_1centos-upgrade-kpatch-patch-5_14_0-162_6_1-debuginfocentos-upgrade-kpatch-patch-5_14_0-162_6_1-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.