|
Message-ID: <20081121190023.GK24416@ldl.fc.hp.com> Date: Fri, 21 Nov 2008 12:00:24 -0700 From: dann frazier <dannf@...ian.org> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel: Unix sockets kernel panic On Tue, Nov 11, 2008 at 05:41:44PM +0800, Eugene Teo wrote: > Eugene Teo wrote: > > We need a CVE name for this issue. This was reported in netdev today. > > > > "The following code causes a kernel panic on Linux 2.6.26: > > http://darkircop.org/unix.c > > > > I haven't investigated the bug so I'm not sure what is causing it, and > > don't know if it's exploitable. The code passes unix sockets from one > > process to another using unix sockets. The bug probably has to do > > with closing file descriptors." > > > > http://marc.info/?l=linux-netdev&m=122593044330973&w=2 > > https://bugzilla.redhat.com/show_bug.cgi?id=470201 > > > > There isn't a fix yet. Dave is working on it. > > There's a fix now. > > Upstream commits: f8d570a, 3b53fbf, and 6209344. > > https://bugzilla.redhat.com/show_bug.cgi?id=470201#c10 > https://bugzilla.redhat.com/show_bug.cgi?id=470201#c14 > https://bugzilla.redhat.com/show_bug.cgi?id=470201#c9 > https://bugzilla.redhat.com/show_bug.cgi?id=470201#c13 Thanks for following up. fyi, our testing of this fix has uncovered additional issues. Local/unprivileged users can cause soft lockups and take out system processes by triggering the OOM killer: http://marc.info/?l=linux-netdev&m=122721862313564&w=2 -- dann frazier
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.