[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Denial of service vulnerability in kernel due to a special stack layout that will force the perf_callchain_user_64 function into an infinite loop

ID: oval:org.secpod.oval:def:26770Date: (C)2015-09-15   (M)2022-10-10
Class: VULNERABILITYFamily: unix




The host is installed with kernel on RHEL 7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a special stack layout that will force the perf_callchain_user_64 function into an infinite loop. Successful exploitation could allow attackers to crash the service.

Platform:
Red Hat Enterprise Linux 7
Product:
kernel
Reference:
CVE-2015-6526
CVE    1
CVE-2015-6526
CPE    2
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:7

© SecPod Technologies