[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2021-1696 --- kernel

ID: oval:org.secpod.oval:def:1700696Date: (C)2021-08-10   (M)2024-04-17
Class: PATCHFamily: unix




A flaw was found in the Linux kernel, where an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack. This issue occurs when the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack. The highest threat from this vulnerability is to confidentiality. A flaw in the Linux kernel allows a privileged BPF program to obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel in the eBPF subsystem A vulnerability was found in the Linux kernel. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory

Platform:
Amazon Linux 2
Product:
kernel
python-perf
perf
Reference:
ALAS2-2021-1696
CVE-2021-34556
CVE-2021-35477
CVE-2021-3655
CVE    3
CVE-2021-34556
CVE-2021-35477
CVE-2021-3655
CPE    4
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:python-perf:python-perf
cpe:/o:amazon:linux:2
...

© SecPod Technologies