| Summary: | Kernel: XFS "xfs_readlink()" Buffer Overflow Vulnerability (CVE-2011-4077) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
| Status: | RESOLVED OBSOLETE | ||
| Severity: | normal | CC: | kernel |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://secunia.com/advisories/46591/ | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
|
Description
Agostino Sarubbo
2011-10-26 16:55:18 UTC
CVE-2011-4077 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4077): Buffer overflow in the xfs_readlink function in fs/xfs/xfs_vnodeops.c in XFS in the Linux kernel 2.6, when CONFIG_XFS_DEBUG is disabled, allows local users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an XFS image containing a symbolic link with a long pathname. There are no longer any 2.x or kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security. |