Описание
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-19769
- https://bugzilla.kernel.org/show_bug.cgi?id=205705
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TF4PQZBEPNXDSK5DOBMW54OCLP25FTCD
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJSIZWKW7RDHKU3CHC5BFAQI43NVHLUQ
- https://security.netapp.com/advisory/ntap-20200103-0001
- https://usn.ubuntu.com/4368-1
- https://usn.ubuntu.com/4369-1
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
In the Linux kernel 5.3.10, there is a use-after-free (read) in the pe ...
Уязвимость функции perf_trace_lock_acquire ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS