Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-3375

Overview

Vulnerability Score 4.9 4.9
CVE Id CVE-2012-3375
Last Modified 17 Aug 2013 02:46:37
Published 03 Oct 2012 07:02:56
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2012-3375

Summary

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

Vulnerable Systems

Operating System

  • Linux Kernel 3.0.1

  • Linux Kernel 3.0.10

  • Linux Kernel 3.0.11

  • Linux Kernel 3.0.12

  • Linux Kernel 3.0.13

  • Linux Kernel 3.0.14

  • Linux Kernel 3.0.15

  • Linux Kernel 3.0.16

  • Linux Kernel 3.0.17

  • Linux Kernel 3.0.18

  • Linux Kernel 3.0.19

  • Linux Kernel 3.0.2

  • Linux Kernel 3.0.20

  • Linux Kernel 3.0.21

  • Linux Kernel 3.0.22

  • Linux Kernel 3.0.23

  • Linux Kernel 3.0.24

  • Linux Kernel 3.0.25

  • Linux Kernel 3.0.26

  • Linux Kernel 3.0.27

  • Linux Kernel 3.0.28

  • Linux Kernel 3.0.29

  • Linux Kernel 3.0.3

  • Linux Kernel 3.0.30

  • Linux Kernel 3.0.31

  • Linux Kernel 3.0.32

  • Linux Kernel 3.0.33

  • Linux Kernel 3.0.34

  • Linux Kernel 3.0.4

  • Linux Kernel 3.0.5

  • Linux Kernel 3.0.6

  • Linux Kernel 3.0.7

  • Linux Kernel 3.0.8

  • Linux Kernel 3.0.9

  • Linux Kernel 3.1.1

  • Linux Kernel 3.1.10

  • Linux Kernel 3.1.2

  • Linux Kernel 3.1.3

  • Linux Kernel 3.1.4

  • Linux Kernel 3.1.5

  • Linux Kernel 3.1.6

  • Linux Kernel 3.1.7

  • Linux Kernel 3.1.8

  • Linux Kernel 3.1.9

  • Linux Kernel 3.2.1

  • Linux Kernel 3.2.10

  • Linux Kernel 3.2.11

  • Linux Kernel 3.2.12

  • Linux Kernel 3.2.13

  • Linux Kernel 3.2.14

  • Linux Kernel 3.2.15

  • Linux Kernel 3.2.16

  • Linux Kernel 3.2.17

  • Linux Kernel 3.2.18

  • Linux Kernel 3.2.19

  • Linux Kernel 3.2.2

  • Linux Kernel 3.2.20

  • Linux Kernel 3.2.21

  • Linux Kernel 3.2.22

  • Linux Kernel 3.2.23

  • Linux Kernel 3.2.3

  • Linux Kernel 3.2.4

  • Linux Kernel 3.2.5

  • Linux Kernel 3.2.6

  • Linux Kernel 3.2.7

  • Linux Kernel 3.2.8

  • Linux Kernel 3.2.9


References

CONFIRM - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d518074a952d33d47c428419693f63389547e9

CONFIRM - https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=837502

MLIST - [oss-security] 20120704 Re: CVE Request -- kernel: epoll: can leak file descriptors when returning -ELOOP

CONFIRM - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24

UBUNTU - USN-1529-1

SECTRACK - 1027237

CONFIRM - https://downloads.avaya.com/css/P8/documents/100165733

SECUNIA - 51164

Related Patches

Red Hat 2012:1061-01 RHSA Moderate: kernel security and bug fix update for RHEL 5 x86

Red Hat 2012:1061-01 RHSA Moderate: kernel security and bug fix update for RHEL 5 x86_64

Novell SUSE 2012:6547 kernel security update for SLE 11 SP1 i586

Novell SUSE 2012:6548 kernel security update for SLE 11 SP1 x86_64

Novell SUSE 2012:6641 kernel security update for SLE 11 SP2 i586

Novell SUSE 2012:6648 kernel security update for SLE 11 SP2 x86_64


Last Updated: 27 May 2016 11:00:50