summaryrefslogtreecommitdiffstats
path: root/ignored/CVE-2005-3660
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-05-01 00:24:08 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-05-01 00:24:08 +0000
commitffe004ca695162d2d20b62e902594315192bf42e (patch)
treeec718b29d4350b7e641500722a8c38b8cac2eb73 /ignored/CVE-2005-3660
parent1c072f8a5423c008ff5201d0434c4bd155981d5d (diff)
CVE-2005-3660 is a known design limitation, moving to ignored
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@798 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored/CVE-2005-3660')
-rw-r--r--ignored/CVE-2005-366020
1 files changed, 20 insertions, 0 deletions
diff --git a/ignored/CVE-2005-3660 b/ignored/CVE-2005-3660
new file mode 100644
index 00000000..2d8276a4
--- /dev/null
+++ b/ignored/CVE-2005-3660
@@ -0,0 +1,20 @@
+Candidate: CVE-2005-3660
+References:
+ http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
+ http://www.securityfocus.com/bid/16041
+Description:
+ Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service
+ (memory exhaustion and panic) by creating a large number of connected
+ file descriptors or socketpairs and setting a large data transfer
+ buffer, then preventing Linux from being able to finish the transfer
+ by causing the process to become a zombie, or closing the file
+ descriptor without closing an associated reference.
+Notes:
+5~ dannf> The fix suggested by idefense includes adding a struct user reference
+ dannf> to struct file. No such thing has gone upstream yet, however.
+Bugs:
+upstream:
+linux-2.6:
+2.6.8-sarge-security: ignored (2.6.8-16sarge5)
+2.4.27-sarge-security: ignored (2.4.27-10sarge4)
+2.6.18-etch-security:

© 2014-2022 Faster IT GmbH | imprint | privacy policy