CVE-2011-1082

Published: 04 April 2011

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

From the Ubuntu security team

Nelson Elhage discovered that the epoll subsystem did not correctly handle certain structures. A local attacker could create malicious requests that would hang the system, leading to a denial of service.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
Patches:
Upstream: http://git.kernel.org/linus/22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38~rc7)