Lucene search

K
f5F5F5:K25225860
HistorySep 05, 2022 - 12:00 a.m.

K25225860 : Linux kernel vulnerabilities CVE-2019-6454, CVE-2020-12888, and CVE-2020-36385

2022-09-0500:00:00
my.f5.com
41

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.6%

Security Advisory Description

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

Impact

There is no impact; F5 products are not affected by these vulnerabilities.