Bug 133070 - signal queuing DoS
signal queuing DoS
Status: CLOSED WONTFIX
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: kernel (Show other bugs)
2.1
i386 Linux
medium Severity high
: ---
: ---
Assigned To: Jim Paradis
Brian Brock
impact=important,public=20040412
: Security
Depends On:
Blocks: 132992
  Show dependency treegraph
 
Reported: 2004-09-21 10:39 EDT by Josh Bressers
Modified: 2013-08-05 21:08 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-06-03 07:40:14 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2004-09-21 10:39:39 EDT
It is possible for a user to exhaust the system process table by
causing a large number of threads/processes to be left in a zombie state.

More information is available here:
http://www.securityfocus.com/bid/10096/discussion/
http://www.securityfocus.com/archive/1/360123

this issue was fixed in upstream here:
http://linux.bkbits.net:8080/linux-2.6/cset@40d302b8vu5PRC3hBFweTrD2FKaAkw
Comment 1 Jim Paradis 2005-02-08 21:09:58 EST
See Bug 133069.  The fix referenced above does not address the issue under
discussion here.  The fix referenced in 133069 cannot be directly ported to RHEL
due to kabi, but there's a proposal to implement something similar that will work.
Comment 3 Mark J. Cox (Product Security) 2005-06-03 07:40:14 EDT
closed as per bug 133069

Note You need to log in before you can comment on or make changes to this bug.