[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2KERNEL-5.4-2022-018 --- kernel

ID: oval:org.secpod.oval:def:1700823Date: (C)2022-02-01   (M)2024-04-17
Class: PATCHFamily: unix




A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality. A use-after-free flaw was found in the Linux kernel's TTY driver functionality in the way the user triggers the con_font_op function. This flaw allows a local user to crash or escalate their privileges on the system or expose sensitive information . A memory leak flaw was found in the Linux kernel's performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability. An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service via a high rate of events to dom0, aka CID-e99502f76271. An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop . This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5. An out-of-bounds SLAB memory access flaw was found in the Linux kernel's fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability

Platform:
Amazon Linux 2
Product:
kernel
perf
python-perf
Reference:
ALAS2KERNEL-5.4-2022-018
CVE-2020-14351
CVE-2020-25656
CVE-2020-25668
CVE-2020-25704
CVE-2020-27673
CVE-2020-27675
CVE-2020-28974
CVE    7
CVE-2020-14351
CVE-2020-25668
CVE-2020-25656
CVE-2020-27675
...
CPE    4
cpe:/a:python-perf:python-perf
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/o:amazon:linux:2
...

© SecPod Technologies