Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1083

Опубликовано: 04 апр. 2011
Источник: debian
EPSS Низкий

Описание

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed3.2.9-1package
linux-2.6fixed2.6.32-47squeezepackage

EPSS

Процентиль: 40%
0.00182
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

redhat
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

nvd
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

github
больше 3 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

oracle-oval
больше 13 лет назад

ELSA-2012-0150: Oracle Linux 5.8 kernel security and bug update (MODERATE)

EPSS

Процентиль: 40%
0.00182
Низкий