[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2021-1477 --- kernel perf

ID: oval:org.secpod.oval:def:1601414Date: (C)2021-01-28   (M)2024-05-22
Class: PATCHFamily: unix




In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c. A flaw was found in the implementation of the BTRFS file system code in the Linux kernel. An attacker, who is able to mount a crafted BTRFS filesystem and perform common filesystem operations, can possibly cause an out-of-bounds write to memory. This could lead to memory corruption or privilege escalation. Array index out of bounds access when setting extended attributes on journaling filesystems. An issue was discovered in Xen through 4.14.x. Some OSes are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD dom0 are vulnerable. An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-

Platform:
Amazon Linux AMI
Product:
kernel
perf
Reference:
ALAS-2021-1477
CVE-2019-19813
CVE-2019-19816
CVE-2020-27815
CVE-2020-29568
CVE-2020-29569
CVE-2020-29660
CVE-2020-29661
CVE    7
CVE-2020-29569
CVE-2020-29568
CVE-2020-29661
CVE-2020-27815
...

© SecPod Technologies