** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Released
** Changed in: linux-ec2 (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Hardy)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Maverick)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Natty)
Status: New => Invalid
** Description changed:
fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file
descriptors within other epoll data structures without properly checking
for (1) closed loops or (2) deep chains, which allows local users to
cause a denial of service (deadlock or stack memory consumption) via a
crafted application that makes epoll_create and epoll_ctl system calls.
- Fixed-by: 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
+ Break-Fix: - 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/820029
Title:
CVE-2011-1082
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/820029/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs