Public Date:
837502: CVE-2012-3375 kernel: epoll: can leak file descriptors when returning -ELOOP

The MITRE CVE dictionary describes this issue as:

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

Find out more about CVE-2012-3375 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, since updates fixing CVE-2011-1083 contained a corrected patch that did not introduce this regression. This has been addressed in Red Hat Enterprise Linux 5 via, and Red Hat Enterprise Linux Red Hat Enterprise MRG 2 via

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 4.9
Base Metrics AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (kernel) RHSA-2012:1061 2012-07-10
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2012:1150 2012-08-08

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 kernel Not affected