4.9
CVSSv2

CVE-2012-3375

Published: 03/10/2012 Updated: 07/11/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 495
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel prior to 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.2.21

linux linux kernel 3.0.25

linux linux kernel 3.1.2

linux linux kernel 3.2.19

linux linux kernel 3.0.22

linux linux kernel 3.0.5

linux linux kernel 3.2.18

linux linux kernel 3.2.5

linux linux kernel 3.0.18

linux linux kernel 3.0.6

linux linux kernel 3.0.11

linux linux kernel 3.0.34

linux linux kernel 3.0.32

linux linux kernel 3.2.16

linux linux kernel 3.0.19

linux linux kernel 3.0.4

linux linux kernel 3.0.27

linux linux kernel 3.2.11

linux linux kernel 3.0.23

linux linux kernel 3.2.10

linux linux kernel 3.0.8

linux linux kernel 3.2.14

linux linux kernel 3.0.33

linux linux kernel 3.0.28

linux linux kernel 3.2.4

linux linux kernel 3.0.13

linux linux kernel 3.2.9

linux linux kernel 3.0.10

linux linux kernel 3.2.15

linux linux kernel 3.0.1

linux linux kernel 3.1.6

linux linux kernel 3.2.20

linux linux kernel 3.2.6

linux linux kernel 3.2.2

linux linux kernel 3.0.17

linux linux kernel 3.1.3

linux linux kernel 3.1.9

linux linux kernel 3.0.16

linux linux kernel 3.2.13

linux linux kernel 3.0.21

linux linux kernel 3.0.7

linux linux kernel 3.1.5

linux linux kernel 3.1.8

linux linux kernel 3.2.1

linux linux kernel 3.2.7

linux linux kernel 3.0.20

linux linux kernel 3.0.24

linux linux kernel 3.0.15

linux linux kernel 3.0.2

linux linux kernel

linux linux kernel 3.1.7

linux linux kernel 3.1.1

linux linux kernel 3.0.12

linux linux kernel 3.2.22

linux linux kernel 3.2.17

linux linux kernel 3.2.8

linux linux kernel 3.1.10

linux linux kernel 3.0.3

linux linux kernel 3.0.9

linux linux kernel 3.0.26

linux linux kernel 3.1.4

linux linux kernel 3.0.30

linux linux kernel 3.0.31

linux linux kernel 3.0.29

linux linux kernel 3.2.12

linux linux kernel 3.0.14

linux linux kernel 3.2.3

Vendor Advisories

Synopsis Moderate: kernel-rt security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel-rt packages that fix two security issues and two bugs arenow available for Red Hat Enterprise MRG 21The Red Hat Security Response Team has rated this update as having moderatesecurity im ...
Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix one security issue and multiple bugs arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impa ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...

Exploits

/* The Linux Kernel is prone to a local denial-of-service vulnerability Successful exploits will allow attackers to cause the kernel to crash, denying service to legitimate users */ #include <netinet/inh> #include <sys/epollh> #include <errnoh> int main () { struct sockaddr_in addr; struct epoll_event event; ...