Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 113058

Summary: Kernel DoS issue
Product: Gentoo Security Reporter: Sune Kloppenborg Jeppesen (RETIRED) <jaervosz>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: normal CC: gregkh, plasmaroo
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard:
Package list:
Runtime testing required: ---

Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-11-19 23:50:41 UTC
On Sat, Nov 19, 2005 at 09:17:05AM -0800, Greg KH wrote: 
> Does anyone have a patch for this yet? 
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-11-19 23:50:41 UTC
On Sat, Nov 19, 2005 at 09:17:05AM -0800, Greg KH wrote: 
> Does anyone have a patch for this yet?  And is 2.6.14 vunerable, or was 
> it fixed after 2.6.12 came out? 
 
Just another kernel memory DoS, whoopeee. Its also prehistoric. Chris Woods 
reported it in 1995 and there are older BSD reports/bugs. 
 
Its a subset of the far funkier problem 
 
        fd = nil  
        for(;;) { 
                open AF_UNIX fd3 
                if(fd != nil) 
                        stuff AF_UNIX fd down fd3 
                fd = fd3 
                while(!full(fd)) 
                { 
                        open AF_UNIX fd2 
                        stuff AF_UNIX fd2 down fd 
                        close fd2 
                } 
        } 
                 
 
Queue data as well for better party trick. 
 
Please don't pass on the improved version to the reporter. I'm having fun 
seeing if they are bright enough to work it out themselves 
 
Alan
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-12-01 01:13:06 UTC
Not sure what to do about this one. I suppose Greg knows :)
Comment 3 Greg Kroah-Hartman (RETIRED) gentoo-dev 2005-12-01 14:27:06 UTC
It's not an issue at all, so I'm closing it.