From ffe004ca695162d2d20b62e902594315192bf42e Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Tue, 1 May 2007 00:24:08 +0000 Subject: CVE-2005-3660 is a known design limitation, moving to ignored git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@798 e094ebfe-e918-0410-adfb-c712417f3574 --- active/CVE-2005-3660 | 20 -------------------- ignored/CVE-2005-3660 | 20 ++++++++++++++++++++ 2 files changed, 20 insertions(+), 20 deletions(-) delete mode 100644 active/CVE-2005-3660 create mode 100644 ignored/CVE-2005-3660 diff --git a/active/CVE-2005-3660 b/active/CVE-2005-3660 deleted file mode 100644 index 2d8276a4..00000000 --- a/active/CVE-2005-3660 +++ /dev/null @@ -1,20 +0,0 @@ -Candidate: CVE-2005-3660 -References: - http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 - http://www.securityfocus.com/bid/16041 -Description: - Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service - (memory exhaustion and panic) by creating a large number of connected - file descriptors or socketpairs and setting a large data transfer - buffer, then preventing Linux from being able to finish the transfer - by causing the process to become a zombie, or closing the file - descriptor without closing an associated reference. -Notes: -5~ dannf> The fix suggested by idefense includes adding a struct user reference - dannf> to struct file. No such thing has gone upstream yet, however. -Bugs: -upstream: -linux-2.6: -2.6.8-sarge-security: ignored (2.6.8-16sarge5) -2.4.27-sarge-security: ignored (2.4.27-10sarge4) -2.6.18-etch-security: diff --git a/ignored/CVE-2005-3660 b/ignored/CVE-2005-3660 new file mode 100644 index 00000000..2d8276a4 --- /dev/null +++ b/ignored/CVE-2005-3660 @@ -0,0 +1,20 @@ +Candidate: CVE-2005-3660 +References: + http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 + http://www.securityfocus.com/bid/16041 +Description: + Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service + (memory exhaustion and panic) by creating a large number of connected + file descriptors or socketpairs and setting a large data transfer + buffer, then preventing Linux from being able to finish the transfer + by causing the process to become a zombie, or closing the file + descriptor without closing an associated reference. +Notes: +5~ dannf> The fix suggested by idefense includes adding a struct user reference + dannf> to struct file. No such thing has gone upstream yet, however. +Bugs: +upstream: +linux-2.6: +2.6.8-sarge-security: ignored (2.6.8-16sarge5) +2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: -- cgit v1.2.3