[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2021-1636 --- kernel, python-perf, perf

ID: oval:org.secpod.oval:def:1700621Date: (C)2021-05-31   (M)2024-05-22
Class: PATCHFamily: unix




An issue was discovered in the Linux kernel related to mm/gup.c and mm/huge_memory.c. The get_user_pages implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access. A use-after-free flaw was found in the Linux kernel"s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads . In this flaw a local, special user privileged BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel. A flaw was found in the Linux kernel"s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality

Platform:
Amazon Linux 2
Product:
kernel
python-perf
perf
Reference:
ALAS2-2021-1636
CVE-2020-29374
CVE-2021-23133
CVE-2021-29155
CVE-2021-31829
CVE-2021-46915
CVE-2021-46904
CVE-2021-46905
CVE    7
CVE-2020-29374
CVE-2021-23133
CVE-2021-29155
CVE-2021-31829
...

© SecPod Technologies