[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2014-0923 -- Oracle kernel_python-perf_perf

ID: oval:org.secpod.oval:def:1500640Date: (C)2014-08-22   (M)2024-02-19
Class: PATCHFamily: unix




It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Platform:
Oracle Linux 7
Product:
kernel
python-perf
perf
Reference:
ELSA-2014-0923
CVE-2014-4943
CVE-2014-4699
CVE    2
CVE-2014-4943
CVE-2014-4699
CPE    389
cpe:/o:linux:linux_kernel:3.4.71
cpe:/o:linux:linux_kernel:3.4.70
cpe:/o:linux:linux_kernel:3.6.10
cpe:/o:linux:linux_kernel:3.6.11
...

© SecPod Technologies