Lucene search

K
f5F5F5:K25225860
HistorySep 05, 2022 - 12:00 a.m.

K25225860 : Linux kernel vulnerabilities CVE-2019-6454, CVE-2020-12888, and CVE-2020-36385

2022-09-0500:00:00
my.f5.com
51
linux kernel
systemd
vfio pci driver
vulnerabilities
use-after-free
denial of service

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

47.6%

Security Advisory Description

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

Impact

There is no impact; F5 products are not affected by these vulnerabilities.