First published: Wed Oct 26 2011(Updated: )
A flaw was found in the way Linux kernel's XFS filesystem implementation handled links with pathname larger than MAXPATHLEN. When CONFIG_XFS_DEBUG configuration option was not enabled when compiling Linux kernel, an attacker able to mount malicious XFS image could use this flaw to crash the system, or potentially, elevate his privileges on that system. Proposed upstream patch: <a href="http://oss.sgi.com/archives/xfs/2011-10/msg00345.html">http://oss.sgi.com/archives/xfs/2011-10/msg00345.html</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.0 | |
Linux Linux kernel | >=2.6.12<3.0.11 | |
Linux Linux kernel | >=3.1<3.1.5 | |
debian/linux-2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.