The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | Patch Third Party Advisory |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 | Mailing List Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2011/08/16/1 | Mailing List Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=730706 | Issue Tracking Patch Third Party Advisory |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233 |
Configurations
Information
Published : 2012-05-24 16:55
Updated : 2023-02-12 20:32
NVD link : CVE-2011-2918
Mitre link : CVE-2011-2918
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
linux
- linux_kernel