Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Aug 2015 01:38:29 -0400 (EDT)
From: Wade Mealing <>
To: OSS Security List <>
Subject: CVE request - Linux kernel - perf on ppp64 - unbounded checks in
 perf_callchain_user_64 denial of service.


A malicious user could create a special stack layout that fools
the perf_callchain_user_64 function (called by perf record) into 
an infinite loop, tying up that particular CPU and the process 
can not be killed.

A kernel patch was committed upstream capping the maximum user-level
stacktrace collected by perf to PERF_MAX_STACK_DEPTH on 64bit powerpc
architectures. This affects ppc64 kernels that support perf.


Wade Mealing

Upstream fix

Red Hat Bugzilla:

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ