Bug 767299 (CVE-2011-4609) - CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error
Summary: CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails wi...
Status: CLOSED ERRATA
Alias: CVE-2011-4609
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20110505,reported=2...
Keywords: Security
Depends On: 702300 767685 767687 767688 767692 767693 767696 769360
Blocks: 767564
TreeView+ depends on / blocked
 
Reported: 2011-12-13 18:34 UTC by Vincent Danen
Modified: 2019-06-08 18:59 UTC (History)
5 users (show)

(edit)
A denial of service flaw was found in the remote procedure call (RPC) implementation in glibc. A remote attacker able to open a large number of connections to an RPC service that is using the RPC implementation from glibc, could use this flaw to make that service use an excessive amount of CPU time.
Clone Of:
(edit)
Last Closed: 2012-02-13 21:01:24 UTC


Attachments (Terms of Use)
patch to correct the flaw (2.31 KB, patch)
2011-12-13 19:04 UTC, Vincent Danen
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0058 normal SHIPPED_LIVE Moderate: glibc security and bug fix update 2012-01-25 02:15:30 UTC
Red Hat Product Errata RHSA-2012:0125 normal SHIPPED_LIVE Moderate: glibc security and bug fix update 2012-02-14 01:33:53 UTC
Red Hat Product Errata RHSA-2012:0126 normal SHIPPED_LIVE Moderate: glibc security update 2012-02-14 01:33:37 UTC

Description Vincent Danen 2011-12-13 18:34:58 UTC
It was reported that if a process that called glibc's svc_run() exceeded the limit of opened files for a longer period of time, that accept() in rendezvous_request()/svcudp_recv() would fail with the EMFILE error, which would lead to looping between poll(), accept(), and 'for' loops which would consume a lot of CPU time.  This could lead to an unresponsive system that requires human intervention (service restart or system restart) to resolve.

Comment 2 Vincent Danen 2011-12-13 19:04:39 UTC
Created attachment 546362 [details]
patch to correct the flaw

Comment 7 errata-xmlrpc 2012-01-24 21:17:55 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0058 https://rhn.redhat.com/errata/RHSA-2012-0058.html

Comment 9 errata-xmlrpc 2012-02-13 20:35:21 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0126 https://rhn.redhat.com/errata/RHSA-2012-0126.html

Comment 10 errata-xmlrpc 2012-02-13 20:35:55 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2012:0125 https://rhn.redhat.com/errata/RHSA-2012-0125.html


Note You need to log in before you can comment on or make changes to this bug.