CVE-2011-1082

Impact:
Moderate
Public Date:
2011-02-05
Bugzilla:
681575: CVE-2011-1082 kernel: potential kernel deadlock when creating circular epoll file structures

The MITRE CVE dictionary describes this issue as:

fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

Find out more about CVE-2011-1082 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0542.html and https://rhn.redhat.com/errata/RHSA-2011-0500.html.

CVSS v2 metrics

Base Score 4.9
Base Metrics AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Server EUS (v. 6.0) (kernel) RHSA-2011:0883 2011-06-21
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2011:0500 2011-05-10
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:0542 2011-05-19

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 1 realtime-kernel Will not fix
Red Hat Enterprise Linux 5 kernel Will not fix
Red Hat Enterprise Linux 4 kernel Will not fix

Acknowledgements

Red Hat would like to thank Nelson Elhage for reporting this issue.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.