{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2011-1083", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[linux-kernel] 20110225 [PATCH] optimize epoll loop detection", "refsource" : "MLIST", "url" : "http://article.gmane.org/gmane.linux.kernel/1105744" }, { "name" : "[linux-kernel] 20110226 Re: [PATCH] optimize epoll loop detection", "refsource" : "MLIST", "url" : "http://article.gmane.org/gmane.linux.kernel/1105888" }, { "name" : "[linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection", "refsource" : "MLIST", "url" : "http://article.gmane.org/gmane.linux.kernel/1106686" }, { "name" : "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll", "refsource" : "MLIST", "url" : "http://openwall.com/lists/oss-security/2011/03/02/1" }, { "name" : "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll", "refsource" : "MLIST", "url" : "http://openwall.com/lists/oss-security/2011/03/02/2" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681578", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681578" }, { "name" : "RHSA-2012:0862", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-0862.html" }, { "name" : "SUSE-SU-2012:0554", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" }, { "name" : "SUSE-SU-2012:0616", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" }, { "name" : "71265", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/71265" }, { "name" : "43522", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/43522" }, { "name" : "48898", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/48898" }, { "name" : "48964", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/48964" }, { "name" : "48115", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/48115" }, { "name" : "48410", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/48410" } ] } }