First published: Thu Mar 23 2000(Updated: )
The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max parameter, which allows local users to cause a denial of service by requesting a large number of sockets.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.2.12 | |
Linux kernel | =2.2.14 | |
Linux kernel | =2.3.99-pre2 | |
=2.2.12 | ||
=2.2.14 | ||
=2.3.99-pre2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0227 has been classified as a moderate severity vulnerability due to its potential to cause denial of service for local users.
To mitigate CVE-2000-0227, you should upgrade to a patched version of the Linux kernel that restricts the number of Unix domain sockets.
CVE-2000-0227 affects Linux kernel versions 2.2.12, 2.2.14, and 2.3.99-pre2.
CVE-2000-0227 enables local users to conduct a denial of service attack by exhausting system resources through the creation of a large number of Unix domain sockets.
Local users on systems running the affected versions of the Linux kernel are at risk from CVE-2000-0227.