ELSA-2014-0923 -- Oracle kernel_python-perf_perfID: oval:org.secpod.oval:def:1500640 | Date: (C)2014-08-22 (M)2024-02-19 |
Class: PATCH | Family: unix |
It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Product: |
kernel |
python-perf |
perf |