4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.001 Low
EPSS
Percentile
19.5%
The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before
3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations,
which allows local users to cause a denial of service (file-descriptor
consumption and system crash) via a crafted application that attempts to
create a circular epoll dependency. NOTE: this vulnerability exists because
of an incorrect fix for CVE-2011-1083.
Author | Note |
---|---|
jdstrand | linux-armadaxp is maintained by OEM |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 11.10 | noarch | linux | <Β 3.0.0-24.40 | UNKNOWN |
ubuntu | 12.04 | noarch | linux | <Β 3.2.0-29.46 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-armadaxp | <Β 3.2.0-1606.9 | UNKNOWN |
ubuntu | 10.04 | noarch | linux-lts-backport-oneiric | <Β 3.0.0-24.40~lucid1 | UNKNOWN |
ubuntu | 11.10 | noarch | linux-ti-omap4 | <Β 3.0.0-1214.26 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-ti-omap4 | <Β 3.2.0-1417.23 | UNKNOWN |
www.openwall.com/lists/oss-security/2012/07/04
launchpad.net/bugs/cve/CVE-2012-3375
nvd.nist.gov/vuln/detail/CVE-2012-3375
security-tracker.debian.org/tracker/CVE-2012-3375
ubuntu.com/security/notices/USN-1514-1
ubuntu.com/security/notices/USN-1529-1
ubuntu.com/security/notices/USN-1532-1
ubuntu.com/security/notices/USN-1533-1
ubuntu.com/security/notices/USN-1539-1
www.cve.org/CVERecord?id=CVE-2012-3375