First published: Mon Nov 09 2020(Updated: )
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.53.1.rt56.1193.el7 | 0:3.10.0-1160.53.1.rt56.1193.el7 |
redhat/kernel | <0:3.10.0-1160.53.1.el7 | 0:3.10.0-1160.53.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
redhat/kernel-rt | <0:4.18.0-193.60.2.rt13.112.el8_2 | 0:4.18.0-193.60.2.rt13.112.el8_2 |
redhat/kernel | <0:4.18.0-193.60.2.el8_2 | 0:4.18.0-193.60.2.el8_2 |
Linux Linux kernel | <=5.9 | |
Linux Linux kernel | =5.10-rc1 | |
Linux Linux kernel | =5.10-rc2 | |
Debian Debian Linux | =9.0 | |
Starwindsoftware Command Center | ||
Starwindsoftware Starwind Hyperconverged Appliance | ||
Starwindsoftware Starwind San \& Nas | =v8r12 | |
Starwindsoftware Starwind Virtual San | =v8-build14398 | |
redhat/kernel | <5.10 | 5.10 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)