[kernel] r5071 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Fri Dec 23 11:40:09 UTC 2005


Author: jmm-guest
Date: Fri Dec 23 11:40:08 2005
New Revision: 5071

Added:
   patch-tracking/CVE-2005-3660
Log:
new kernel dos 


Added: patch-tracking/CVE-2005-3660
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-3660	Fri Dec 23 11:40:08 2005
@@ -0,0 +1,24 @@
+Candidate: CVE-2005-3660
+References: 
+ http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
+ http://www.securityfocus.com/bid/16041
+Description: 
+ Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service
+ (memory exhaustion and panic) by creating a large number of connected
+ file descriptors or socketpairs and setting a large data transfer
+ buffer, then preventing Linux from being able to finish the transfer
+ by causing the process to become a zombie, or closing the file
+ descriptor without closing an associated reference.
+Notes: 
+Bugs: 
+upstream: 
+linux-2.6:
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.6.8: 
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 



More information about the Kernel-svn-changes mailing list