Description
ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1786-1 | New acpid packages fix denial of service |
EUVD |
EUVD-2009-0796 | ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop. |
Ubuntu USN |
USN-766-1 | acpid vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T04:48:51.991Z
Reserved: 2009-03-04T00:00:00.000Z
Link: CVE-2009-0798
No data.
Status : Modified
Published: 2009-04-24T15:30:00.250
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0798
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN