CVE-2008-5029
Properties
- Published:
- 09.11.2008
- Updated:
- 29.01.2009
- Patch available:
- Severity:
- Medium
- CVSS vector:
- (AV:L/AC:L/Au:N/C:N/I:N/A:C)
- Product:
-
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
linux: kernel
Vulnerability description
The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.References:
BID: http://www.securityfocus.com/bid/32154CONFIRM: https://bugzilla.redhat.com/show_bug.cgi?id=470201
UBUNTU: http://www.ubuntu.com/usn/usn-679-1
SECTRACK: http://www.securitytracker.com/id?1021511
SECTRACK: http://www.securitytracker.com/id?1021292
BID: http://www.securityfocus.com/bid/33079
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/499700/100/0/threaded
REDHAT: http://www.redhat.com/support/errata/RHSA-2009-0225.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2009-0009.html
MLIST: http://www.openwall.com/lists/oss-security/2008/11/06/1
MANDRIVA: http://www.mandriva.com/security/advisories?name=MDVSA-2008:234
DEBIAN: http://www.debian.org/security/2008/dsa-1687
DEBIAN: http://www.debian.org/security/2008/dsa-1681
SREASON: http://securityreason.com/securityalert/4573
SECUNIA: http://secunia.com/advisories/33623
SECUNIA: http://secunia.com/advisories/33586
SECUNIA: http://secunia.com/advisories/33180
SECUNIA: http://secunia.com/advisories/32998
SECUNIA: http://secunia.com/advisories/32918
MLIST: http://marc.info/?l=linux-netdev&m=122593044330973&w=2
SUSE: http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
MISC: http://darkircop.org/unix.c