{ "id": "CVE-2011-1082", "sourceIdentifier": "secalert@redhat.com", "published": "2011-04-04T12:27:57.357", "lastModified": "2024-11-21T01:25:28.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls." }, { "lang": "es", "value": "fs/eventpoll.c en el kernel de Linux anterior a v2.6.38 coloca descriptores de fichero epoll dentro de otra estructura de datos epoll sin comprobar correctamente para (1) bucles cerrados (2) profundidad de cadena, lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio (bloqueo o agotamiento de la pila de memoria) a trav\u00e9s de una aplicaci\u00f3n que hace epoll_create y llamadas al sistema epoll_ctl." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-400" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.38", "matchCriteriaId": "9988A98F-3440-467E-8ADA-1E413DC25C21" } ] } ] } ], "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e", "source": "secalert@redhat.com" }, { "url": "http://openwall.com/lists/oss-security/2011/03/02/1", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://openwall.com/lists/oss-security/2011/03/02/2", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", "source": "secalert@redhat.com", "tags": [ "Broken Link" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681575", "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ] }, { "url": "https://lkml.org/lkml/2011/2/5/220", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://openwall.com/lists/oss-security/2011/03/02/1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://openwall.com/lists/oss-security/2011/03/02/2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681575", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ] }, { "url": "https://lkml.org/lkml/2011/2/5/220", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] } ] }