Denial of service vulnerability in kernel due to a special stack layout that will force the perf_callchain_user_64 function into an infinite loopID: oval:org.secpod.oval:def:26770 | Date: (C)2015-09-15 (M)2022-10-10 |
Class: VULNERABILITY | Family: unix |
The host is installed with kernel on RHEL 7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a special stack layout that will force the perf_callchain_user_64 function into an infinite loop. Successful exploitation could allow attackers to crash the service.
Platform: |
Red Hat Enterprise Linux 7 |