Summary: | Kernel DoS issue | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | gregkh, plasmaroo |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
On Sat, Nov 19, 2005 at 09:17:05AM -0800, Greg KH wrote:
> Does anyone have a patch for this yet? And is 2.6.14 vunerable, or was
> it fixed after 2.6.12 came out?
Just another kernel memory DoS, whoopeee. Its also prehistoric. Chris Woods
reported it in 1995 and there are older BSD reports/bugs.
Its a subset of the far funkier problem
fd = nil
for(;;) {
open AF_UNIX fd3
if(fd != nil)
stuff AF_UNIX fd down fd3
fd = fd3
while(!full(fd))
{
open AF_UNIX fd2
stuff AF_UNIX fd2 down fd
close fd2
}
}
Queue data as well for better party trick.
Please don't pass on the improved version to the reporter. I'm having fun
seeing if they are bright enough to work it out themselves
Alan
Not sure what to do about this one. I suppose Greg knows :) It's not an issue at all, so I'm closing it. |
On Sat, Nov 19, 2005 at 09:17:05AM -0800, Greg KH wrote: > Does anyone have a patch for this yet?