Improper Validation of Array Index Affecting perf package, versions *
Threat Intelligence
EPSS
0.04% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-PERF-7044889
- published 23 May 2024
- disclosed 21 May 2024
Introduced: 21 May 2024
CVE-2023-52819 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
perf
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perf
package and not the perf
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
For pptable structs that use flexible array sizes, use flexible arrays.
References
- https://access.redhat.com/security/cve/CVE-2023-52819
- https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356
- https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6
- https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216
- https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92
- https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1
- https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e
- https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18
- https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4
- https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679
CVSS Scores
version 3.1