CVE-2011-1082 (retired)

Priority
Description
fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file
descriptors within other epoll data structures without properly checking
for (1) closed loops or (2) deep chains, which allows local users to cause
a denial of service (deadlock or stack memory consumption) via a crafted
application that makes epoll_create and epoll_ctl system calls.
Ubuntu-Description
Nelson Elhage discovered that the epoll subsystem did not correctly handle
certain structures. A local attacker could create malicious requests that
would hang the system, leading to a denial of service.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.38~rc7)
Patches:
Upstream:http://git.kernel.org/linus/22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Patches:
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
More Information

Updated: 2019-03-26 11:55:36 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)