CVE-2011-1082

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e -
References () http://openwall.com/lists/oss-security/2011/03/02/1 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2011/03/02/1 - Mailing List, Patch, Third Party Advisory
References () http://openwall.com/lists/oss-security/2011/03/02/2 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2011/03/02/2 - Mailing List, Patch, Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38 - Broken Link () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=681575 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=681575 - Issue Tracking, Patch, Third Party Advisory
References () https://lkml.org/lkml/2011/2/5/220 - Mailing List, Patch, Third Party Advisory () https://lkml.org/lkml/2011/2/5/220 - Mailing List, Patch, Third Party Advisory

Information

Published : 2011-04-04 12:27

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1082

Mitre link : CVE-2011-1082

CVE.ORG link : CVE-2011-1082


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption