diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-01 00:24:08 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-01 00:24:08 +0000 |
commit | ffe004ca695162d2d20b62e902594315192bf42e (patch) | |
tree | ec718b29d4350b7e641500722a8c38b8cac2eb73 /ignored/CVE-2005-3660 | |
parent | 1c072f8a5423c008ff5201d0434c4bd155981d5d (diff) |
CVE-2005-3660 is a known design limitation, moving to ignored
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@798 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored/CVE-2005-3660')
-rw-r--r-- | ignored/CVE-2005-3660 | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/ignored/CVE-2005-3660 b/ignored/CVE-2005-3660 new file mode 100644 index 00000000..2d8276a4 --- /dev/null +++ b/ignored/CVE-2005-3660 @@ -0,0 +1,20 @@ +Candidate: CVE-2005-3660 +References: + http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 + http://www.securityfocus.com/bid/16041 +Description: + Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service + (memory exhaustion and panic) by creating a large number of connected + file descriptors or socketpairs and setting a large data transfer + buffer, then preventing Linux from being able to finish the transfer + by causing the process to become a zombie, or closing the file + descriptor without closing an associated reference. +Notes: +5~ dannf> The fix suggested by idefense includes adding a struct user reference + dannf> to struct file. No such thing has gone upstream yet, however. +Bugs: +upstream: +linux-2.6: +2.6.8-sarge-security: ignored (2.6.8-16sarge5) +2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: |