A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2023-01-18 00:24 | ALAS2KERNEL-5.10-2023-025 |
Amazon Linux 2 - Kernel-5.15 Extra | kernel | 2022-12-01 18:21 | ALAS2KERNEL-5.15-2022-011 |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2023-01-18 00:25 | ALAS2KERNEL-5.4-2023-041 |
Amazon Linux 2023 | kernel | 2023-02-17 20:46 | ALAS2023-2023-070 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.144-127.601 | 2023-01-18 00:25 | ALAS2LIVEPATCH-2023-098 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.144-127.601 | 2023-02-03 20:56 | ALAS2LIVEPATCH-2023-104 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.147-133.644 | 2023-02-03 20:56 | ALAS2LIVEPATCH-2023-103 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.147-133.644 | 2023-01-18 00:25 | ALAS2LIVEPATCH-2023-097 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.149-133.644 | 2023-02-03 20:56 | ALAS2LIVEPATCH-2023-105 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.149-133.644 | 2023-01-18 00:25 | ALAS2LIVEPATCH-2023-099 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.155-138.670 | 2023-02-03 20:56 | ALAS2LIVEPATCH-2023-106 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.155-138.670 | 2023-01-18 00:25 | ALAS2LIVEPATCH-2023-101 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.157-139.675 | 2023-02-03 20:56 | ALAS2LIVEPATCH-2023-107 |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-5.10.157-139.675 | 2023-01-18 00:25 | ALAS2LIVEPATCH-2023-102 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |