Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2207
HistoryAug 01, 2023 - 1:20 p.m.

Advisory ROSA-SA-2023-2207

2023-08-0113:20:59
ROSA LAB
abf.rosalinux.ru
13
kernel-5.10
rosa-chrome
vulnerability impact
memory usage
file system
denial of service
privilege escalation
critical
fixed
resolved

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

software: kernel-5.10 5.10.184
WASP: ROSA-CHROME

package_evr_string: kernel-5.10-generic-5.10.184-1.src.rpm

CVE-ID: CVE-2023-34255
BDU-ID: 2023-02994
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the xfs_btree_lookup_get_block() function of the Linux operating systems kernel is related to memory usage after memory is freed. Exploitation of the vulnerability could allow an attacker to impact the confidentiality, integrity and availability of protected information
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update kernel-5.10-generic

CVE-ID: CVE-2023-2124
BDU-ID: 2023-02529
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the XFS file system of the Linux operating system kernel is related to insufficient metadata control during mount (mount) of images with the XFS file system in the xlog_recover_buf_commit_pass2() function in the fs/xfs/xfs_buf_item_recover.c module. Exploitation of the vulnerability could allow an attacker to cause a denial of service or elevate their privileges
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update kernel-5.10-generic

CVE-ID: CVE-2023-3111
BDU-ID: 2023-03163
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the prepare_to_relocate() function in the fs/btrfs/relocation.c module of the btrfs file system of the Linux operating system kernel is related to memory usage after it has been freed. Exploitation of the vulnerability could allow an attacker to impact the confidentiality, integrity and availability of protected information
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update kernel-5.10-generic

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%