** Changed in: linux-ec2 (Ubuntu Lucid)
       Status: New => Fix Released

** Changed in: linux-ec2 (Ubuntu Oneiric)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
       Status: New => Invalid

** Description changed:

  fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file
  descriptors within other epoll data structures without properly checking
  for (1) closed loops or (2) deep chains, which allows local users to
  cause a denial of service (deadlock or stack memory consumption) via a
  crafted application that makes epoll_create and epoll_ctl system calls.
  
- Fixed-by: 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
+ Break-Fix: - 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/820029

Title:
  CVE-2011-1082

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/820029/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to