CVE-2011-1082

Priority
Low
Description
fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file
descriptors within other epoll data structures without properly checking
for (1) closed loops or (2) deep chains, which allows local users to cause
a denial of service (deadlock or stack memory consumption) via a crafted
application that makes epoll_create and epoll_ctl system calls.
Ubuntu-Description
Nelson Elhage discovered that the epoll subsystem did not correctly handle
certain structures. A local attacker could create malicious requests that
would hang the system, leading to a denial of service.
References
Bugs
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Patches:
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.38~rc7)
Patches:
Upstream:http://git.kernel.org/linus/22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
Package
Upstream:released (2.6.38~rc7)
More Information

Updated: 2018-06-26 04:40:07 UTC (commit 7799c934cca373482531a7b00e4dfe82302ceae5)