Bug 767299 (CVE-2011-4609) - CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error
Summary: CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails wi...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-4609
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 702300 767685 767687 767688 767692 767693 767696 769360
Blocks: 767564
TreeView+ depends on / blocked
 
Reported: 2011-12-13 18:34 UTC by Vincent Danen
Modified: 2024-08-27 08:47 UTC (History)
10 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2012-02-13 21:01:24 UTC
Embargoed:


Attachments (Terms of Use)
patch to correct the flaw (2.31 KB, patch)
2011-12-13 19:04 UTC, Vincent Danen
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0058 0 normal SHIPPED_LIVE Moderate: glibc security and bug fix update 2012-01-25 02:15:30 UTC
Red Hat Product Errata RHSA-2012:0125 0 normal SHIPPED_LIVE Moderate: glibc security and bug fix update 2012-02-14 01:33:53 UTC
Red Hat Product Errata RHSA-2012:0126 0 normal SHIPPED_LIVE Moderate: glibc security update 2012-02-14 01:33:37 UTC

Description Vincent Danen 2011-12-13 18:34:58 UTC
It was reported that if a process that called glibc's svc_run() exceeded the limit of opened files for a longer period of time, that accept() in rendezvous_request()/svcudp_recv() would fail with the EMFILE error, which would lead to looping between poll(), accept(), and 'for' loops which would consume a lot of CPU time.  This could lead to an unresponsive system that requires human intervention (service restart or system restart) to resolve.

Comment 2 Vincent Danen 2011-12-13 19:04:39 UTC
Created attachment 546362 [details]
patch to correct the flaw

Comment 7 errata-xmlrpc 2012-01-24 21:17:55 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0058 https://rhn.redhat.com/errata/RHSA-2012-0058.html

Comment 9 errata-xmlrpc 2012-02-13 20:35:21 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0126 https://rhn.redhat.com/errata/RHSA-2012-0126.html

Comment 10 errata-xmlrpc 2012-02-13 20:35:55 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2012:0125 https://rhn.redhat.com/errata/RHSA-2012-0125.html


Note You need to log in before you can comment on or make changes to this bug.