An issue was discovered in the Linux kernel in the filter parsing code in kernel/trace/trace_events_filter.c. The code could be called with no filter, when it expected at least one. This allows attackers to cause a slab out-of-bounds write and so a denial of service via crafted perf_event_open and mmap system calls. References: https://bugzilla.kernel.org/show_bug.cgi?id=200019 https://marc.info/?l=linux-kernel&m=152973006431221&w=2 An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=70303420b5721c38998cf987e6b7d30cc62d4ff1
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1595837]