Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 3 Dec 2008 12:26:19 -0500 (EST)
From: "Steven M. Christey" <>
cc: "Steven M. Christey" <>
Subject: Re: CVE request: kernel: Unix sockets kernel panic

current writeup for CVE-2008-5300:

Name: CVE-2008-5300
Status: Candidate
Reference: MLIST:[linux-netdev] 20081120 soft lockups/OOM after unix socket fixes
Reference: URL:
Reference: MLIST:[linux-netdev] 20081125 [PATCH] Fix soft lockups/OOM issues w/ unix garbage collector
Reference: URL:
Reference: CONFIRM:

Linux kernel 2.6.28 allows local users to cause a denial of service
("soft lockup" and process loss) via a large number of sendmsg
function calls, which does not block during AF_UNIX garbage collection
and triggers an OOM condition, a different vulnerability than

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.