|
|
Message-ID: <Pine.GSO.4.51.0812031225441.15404@faron.mitre.org>
Date: Wed, 3 Dec 2008 12:26:19 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: Unix sockets kernel panic
current writeup for CVE-2008-5300:
======================================================
Name: CVE-2008-5300
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300
Reference: MLIST:[linux-netdev] 20081120 soft lockups/OOM after unix socket fixes
Reference: URL:http://marc.info/?l=linux-netdev&m=122721862313564&w=2
Reference: MLIST:[linux-netdev] 20081125 [PATCH] Fix soft lockups/OOM issues w/ unix garbage collector
Reference: URL:http://marc.info/?l=linux-netdev&m=122765505415944&w=2
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=470201
Linux kernel 2.6.28 allows local users to cause a denial of service
("soft lockup" and process loss) via a large number of sendmsg
function calls, which does not block during AF_UNIX garbage collection
and triggers an OOM condition, a different vulnerability than
CVE-2008-5029.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.