[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2016-703 ---- kernel perf

ID: oval:org.secpod.oval:def:1600403Date: (C)2016-06-01   (M)2023-12-20
Class: PATCHFamily: unix




The Linux kernel did not properly suppress hugetlbfs support in x86 PV guests, which could allow local PV guest users to cause a denial of service by attempting to access a hugetlbfs mapped area. A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system. Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling. The following flaws were also fixed in this version:CVE-2016-4557 : Use after free vulnerability via double fdputCVE-2016-4581 : Slave being first propagated copy causes oops in propagate_mntCVE-2016-4486 : Information leak in rtnetlinkCVE-2016-4485 : Information leak in llc moduleCVE-2016-4558 : bpf: refcnt overflowCVE-2016-4565 : infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.koCVE-2016-0758 : tags with indefinite length can corrupt pointers in asn1_find_indefinite_lengthCVE-2015-8839 : ext4 filesystem page fault race condition with fallocate call.

Platform:
Amazon Linux AMI
Product:
kernel
perf
Reference:
ALAS-2016-703
CVE-2016-4557
CVE-2016-3961
CVE-2016-4581
CVE-2016-4486
CVE-2016-4485
CVE-2016-4558
CVE-2016-4565
CVE-2016-0758
CVE-2015-8839
CVE    9
CVE-2016-0758
CVE-2016-4486
CVE-2016-4485
CVE-2016-4565
...
CPE    3
cpe:/o:amazon:linux
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf

© SecPod Technologies