From ffe004ca695162d2d20b62e902594315192bf42e Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Tue, 1 May 2007 00:24:08 +0000 Subject: CVE-2005-3660 is a known design limitation, moving to ignored git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@798 e094ebfe-e918-0410-adfb-c712417f3574 --- ignored/CVE-2005-3660 | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 ignored/CVE-2005-3660 (limited to 'ignored/CVE-2005-3660') diff --git a/ignored/CVE-2005-3660 b/ignored/CVE-2005-3660 new file mode 100644 index 00000000..2d8276a4 --- /dev/null +++ b/ignored/CVE-2005-3660 @@ -0,0 +1,20 @@ +Candidate: CVE-2005-3660 +References: + http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 + http://www.securityfocus.com/bid/16041 +Description: + Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service + (memory exhaustion and panic) by creating a large number of connected + file descriptors or socketpairs and setting a large data transfer + buffer, then preventing Linux from being able to finish the transfer + by causing the process to become a zombie, or closing the file + descriptor without closing an associated reference. +Notes: +5~ dannf> The fix suggested by idefense includes adding a struct user reference + dannf> to struct file. No such thing has gone upstream yet, however. +Bugs: +upstream: +linux-2.6: +2.6.8-sarge-security: ignored (2.6.8-16sarge5) +2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: -- cgit v1.2.3