CVE-2012-3375 REJECTED

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

EPSS 0.14% · 33.4th percentile

Risk Scores

EPSS Score
0.14%
33.4th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:14.04:LTSlinux0
Ubuntu:16.04:LTSlinux-goldfish3.4.0-4.24, 3.4.0-4.26, 0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:16.04:LTSlinux0
Ubuntu:14.04:LTSlinux-goldfish0, 3.4.0-1.7
Ubuntu:14.04:LTSlinux-flo0
Ubuntu:16.04:LTSlinux-mako0, 3.4.0-7.39
Ubuntu:14.04:LTSlinux-manta0
Ubuntu:14.04:LTSlinux-mako0
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:16.04:LTSlinux-flo0, 3.4.0-5.19
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:14.04:LTSlinux-lts-utopic0

Timeline

References

Open in Interactive Console →