[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2021-1685 --- kernel

ID: oval:org.secpod.oval:def:1700675Date: (C)2021-07-19   (M)2024-05-22
Class: PATCHFamily: unix




A vulnerability was found in the bluez, where Passkey Entry protocol used in Secure Simple Pairing , Secure Connections and LE Secure Connections of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge. A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity. A denial-of-service flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem. A flaw was found in the Linux kernel"s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability. A flaw was found in the Linux kernel"s BPF subsystem, where protection against speculative execution attacks can be bypassed. The highest threat from this vulnerability is to confidentiality. A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. A flaw use-after-free in the Linux kernel HCI subsystem was found in the way user detaches bluetooth dongle or other way triggers unregister bluetooth device event. A local user could use this flaw to crash the system or escalate their privileges on the system

Platform:
Amazon Linux 2
Product:
kernel
python-perf
perf
Reference:
ALAS2-2021-1685
CVE-2020-26558
CVE-2021-0129
CVE-2021-29650
CVE-2021-32399
CVE-2021-33034
CVE-2021-33624
CVE-2021-3564
CVE-2021-3573
CVE-2021-46906
CVE-2021-46950
CVE-2021-46953
CVE-2021-46939
CVE-2021-46938
CVE    13
CVE-2021-0129
CVE-2021-32399
CVE-2021-33624
CVE-2020-26558
...

© SecPod Technologies