[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2021:1578-01 -- Redhat kernel, bpftool, perf, python3-perf

ID: oval:org.secpod.oval:def:506091Date: (C)2021-05-21   (M)2024-05-09
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: Integer overflow in Intel Graphics Drivers * kernel: memory leak in sof_set_get_large_ctrl_data function in sound/soc/sof/ipc.c * kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * kernel: possible out of bounds write in kbd_keycode of keyboard.c * kernel: DoS by corrupting mountpoint reference counter * kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c * kernel: buffer uses out of index in ext3/4 filesystem * kernel: Use After Free vulnerability in cgroup BPF component * kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c * kernel: umask not applied on filesystem without ACL support * kernel: TOCTOU mismatch in the NFS client code * kernel: incomplete permission checking for access to rbd devices * kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c * kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow * kernel: perf_event_parse_addr_filter memory * kernel: use-after-free in kernel midi subsystem * kernel: child process is able to access parent mm through hfi dev file handle * kernel: slab-out-of-bounds read in fbcon * kernel: fork: fix copy_process race with the exiting - -real_parent * kernel: fuse: fuse_do_getattr calls make_bad_inode in inappropriate situations * kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege * kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 8
Product:
kernel
bpftool
perf
python3-perf
Reference:
RHSA-2021:1578-01
CVE-2019-18811
CVE-2019-19523
CVE-2019-19528
CVE-2020-0431
CVE-2020-11608
CVE-2020-12114
CVE-2020-12362
CVE-2020-12464
CVE-2020-14314
CVE-2020-14356
CVE-2020-15437
CVE-2020-24394
CVE-2020-25212
CVE-2020-25284
CVE-2020-25285
CVE-2020-25643
CVE-2020-25704
CVE-2020-27786
CVE-2020-27835
CVE-2020-28974
CVE-2020-35508
CVE-2020-36322
CVE-2021-0342
CVE-2023-1390
CVE-2020-36557
CVE-2021-0605
CVE-2020-12364
CVE-2020-12363
CVE    28
CVE-2020-25212
CVE-2021-0605
CVE-2020-11608
CVE-2020-27835
...

© SecPod Technologies