Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1082

Опубликовано: 05 фев. 2011
Источник: redhat
CVSS2: 4.9
EPSS Низкий

Описание

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

Отчет

This issue does not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0542.html and https://rhn.redhat.com/errata/RHSA-2011-0500.html.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4kernelAffected
Red Hat Enterprise Linux 5kernelAffected
MRG for RHEL-5kernel-rtFixedRHSA-2011:050010.05.2011
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:054219.05.2011
Red Hat Enterprise Linux 6.0 EUS - Server OnlykernelFixedRHSA-2011:088321.06.2011

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=681575kernel: potential kernel deadlock when creating circular epoll file structures

EPSS

Процентиль: 47%
0.00238
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

nvd
около 14 лет назад

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

debian
около 14 лет назад

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file des ...

github
около 3 лет назад

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

oracle-oval
около 14 лет назад

ELSA-2011-2016: Unbreakable Enterprise kernel security fix update (IMPORTANT)

EPSS

Процентиль: 47%
0.00238
Низкий

4.9 Medium

CVSS2