This occurs because a certain comparison uses values that are not memory sizes.īlueZ is a Bluetooth protocol stack for Linux. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because of an attempt to access the subjective credentials of another task.Īn issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.Īn issue was discovered in the Linux kernel before 5.14.8. In _f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry.Ī use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. There is a memory leak in the _rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances. An issue was discovered in the Linux kernel before 5.15.11.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |