[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2011-022 --- kernel, perf

ID: oval:org.secpod.oval:def:1601236Date: (C)2020-11-27   (M)2023-08-03
Class: PATCHFamily: unix




The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service via a crafted application that makes epoll_create and epoll_ctl system calls.Buffer overflow in the xfs_readlink function in fs/xfs/xfs_vnodeops.c in XFS in the Linux kernel 2.6, when CONFIG_XFS_DEBUG is disabled, allows local users to cause a denial of service and possibly execute arbitrary code via an XFS image containing a symbolic link with a long pathname.crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a ghash_update function call or ghash_final function call, as demonstrated by a write operation on an AF_ALG socket.

Platform:
Amazon Linux AMI
Product:
kernel
perf
Reference:
ALAS-2011-22
CVE-2011-1083
CVE-2011-4077
CVE-2011-4081
CVE    3
CVE-2011-1083
CVE-2011-4081
CVE-2011-4077
CPE    4
cpe:/o:amazon:linux
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/o:linux:linux_kernel:2.6.0
...

© SecPod Technologies