4.9
CVSSv2

CVE-2011-1082

Published: 04/04/2011 Updated: 13/02/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 495
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

fs/eventpoll.c in the Linux kernel prior to 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Multiple kernel flaws have been fixed ...
Multiple kernel vulnerabilities have been fixed ...
An attacker could send crafted input to the kernel and cause it to crash ...
Multiple kernel vulnerabilities have been fixed ...
Multiple kernel flaws have been fixed ...

Exploits

/* source: wwwsecurityfocuscom/bid/46630/info The Linux Kernel epoll Subsystem is prone to multiple local denial-of-service vulnerabilities Successful exploits will allow attackers to cause the kernel to hang, denying service to legitimate users */ #include <unistdh> #include <sys/epollh> #include <sys/timeh> # ...
Ubuntu Security Notice 1202-1 - Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly A local user could exploit this to read kernel stack memory, leading to a loss of privacy Brad Spengler discovered that stack memory for new a process was not correctly calculated A local attacker could exploit this to crash ...