First published: Mon Dec 04 2023(Updated: )
A flaw was found in the Linux kernel. It is possible to overflow a perf_event's read_size, causing an out-of-bounds write in perf_read_group(). The check meant to prevent such an overflow in perf_event_validate_size() does not account for groups of events with mixed read_format values. The flaw can be triggered with events created with PERF_FORMAT_GROUP or events added with PERF_FORMAT_GROUP after some preconditions. The bug was introduced around fa8c269353d5 ("perf/core: Invert perf_read_group() loops"). Fixes: a723968c0ed3 ("perf: Fix u16 overflows"). Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b">https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b</a>
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP8 IF01 | |
Linux kernel | >=4.3<6.7 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6931 has been classified as a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2023-6931, upgrade to a patched version of the Linux kernel that addresses this specific vulnerability.
CVE-2023-6931 affects Linux kernel versions from 4.3 up to, but not including, version 6.7.
Distributions such as Debian 10.0 and IBM QRadar SIEM versions up to 7.5.0 UP8 IF01 are impacted by CVE-2023-6931.
CVE-2023-6931 can lead to an out-of-bounds write in perf_read_group(), potentially allowing for unauthorized actions by an attacker.