ALAS-2019-1280 --- kernel perfID: oval:org.secpod.oval:def:1601047 | Date: (C)2019-09-27 (M)2024-04-17 |
Class: PATCH | Family: unix |
It was found that paravirt_patch_call/jump functions in the arch/x86/kernel/paravirt.c in the Linux kernel mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtualized guests.A buffer overflow due to a singed-unsigned comparsion was found in hidp_process_report in the net/bluetooth/hidp/core.c in the Linux kernel. The buffer length is an unsigned int but gets cast to a signed int which in certain conditions can lead to a system panic and a denial-of-service.Note: The Release Date is incorrect. These CVEs were fixed Sept. 2018
Platform: |
Amazon Linux AMI |