Updated: September 09, 2002
Status
Not Affected
Vendor Statement
Openwall GNU/*/Linux is not vulnerable. In fact, none of Linux 2.0, 2.2, and 2.4 are. As the corresponding limits are configurable on 2.2 and 2.4 and in order to be safe in case of future code changes, we're, however, also adding redundant defensive hard-coded limits right into both select(2) and poll(2). More detail: Linux 2.0 only has select(2) and a hard-coded limit. Linux 2.2 and 2.4 have both calls and configurable limits, but expand_fd_array() and expand_fdset() wouldn't let files->max_fds and files->max_fdset grow beyond a defensive hard-coded limit, even if a higher limit has been set via procfs or sysctl. And it's precisely files->max_fds and files->max_fdset which are used by select(2) and poll(2).
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
The CERT/CC has no additional comments at this time.