[kernel] r5071 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Fri Dec 23 11:40:09 UTC 2005
Author: jmm-guest
Date: Fri Dec 23 11:40:08 2005
New Revision: 5071
Added:
patch-tracking/CVE-2005-3660
Log:
new kernel dos
Added: patch-tracking/CVE-2005-3660
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-3660 Fri Dec 23 11:40:08 2005
@@ -0,0 +1,24 @@
+Candidate: CVE-2005-3660
+References:
+ http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
+ http://www.securityfocus.com/bid/16041
+Description:
+ Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service
+ (memory exhaustion and panic) by creating a large number of connected
+ file descriptors or socketpairs and setting a large data transfer
+ buffer, then preventing Linux from being able to finish the transfer
+ by causing the process to become a zombie, or closing the file
+ descriptor without closing an associated reference.
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.6.8:
+2.4.19-woody-security:
+2.4.18-woody-security:
+2.4.17-woody-security:
+2.4.16-woody-security:
+2.4.17-woody-security-hppa:
+2.4.17-woody-security-ia64:
More information about the Kernel-svn-changes
mailing list