Total vulnerabilities in the database
fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 3.1.2 | 3.1.2.x |
linux / linux_kernel | - | 3.1.10.x |
linux / linux_kernel | 3.1.6 | 3.1.6.x |
linux / linux_kernel | 3.1.3 | 3.1.3.x |
linux / linux_kernel | 3.1.9 | 3.1.9.x |
linux / linux_kernel | 3.1.5 | 3.1.5.x |
linux / linux_kernel | 3.1.8 | 3.1.8.x |
linux / linux_kernel | 3.1.7 | 3.1.7.x |
linux / linux_kernel | 3.1.1 | 3.1.1.x |
linux / linux_kernel | 3.1.4 | 3.1.4.x |