fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
References
Configurations
History
21 Nov 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e - | |
References | () http://openwall.com/lists/oss-security/2011/03/02/1 - Mailing List, Patch, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2011/03/02/2 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=681575 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lkml.org/lkml/2011/2/5/220 - Mailing List, Patch, Third Party Advisory |
Information
Published : 2011-04-04 12:27
Updated : 2024-11-21 01:25
NVD link : CVE-2011-1082
Mitre link : CVE-2011-1082
CVE.ORG link : CVE-2011-1082
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-400
Uncontrolled Resource Consumption