[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2022-1798 --- kernel

ID: oval:org.secpod.oval:def:1700929Date: (C)2022-06-14   (M)2024-05-05
Class: PATCHFamily: unix




A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space. A NULL pointer dereference flaw was found in the Linux kernel's X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system. perf: Fix sys_perf_event_open race against self Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions. The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag

Platform:
Amazon Linux 2
Product:
kernel
perf
python-perf
Reference:
ALAS2-2022-1798
CVE-2022-0854
CVE-2022-1729
CVE-2022-29581
CVE-2022-30594
CVE-2023-4459
CVE-2022-48619
CVE-2023-4387
CVE-2022-2639
CVE    8
CVE-2023-4459
CVE-2023-4387
CVE-2022-2639
CVE-2022-48619
...

© SecPod Technologies