Описание
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Broken Link
- Broken Link
- Broken Link
- Broken Link
- Broken Link
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Broken Link
- Broken Link
- Broken Link
- Broken Link
- Broken Link
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Одно из
EPSS
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
The __do_follow_link function in fs/namei.c in the Linux kernel before ...
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
ELSA-2014-0771: kernel security and bug fix update (IMPORTANT)
EPSS
5.5 Medium
CVSS3
4.9 Medium
CVSS2