|
Message-ID: <Pine.GSO.4.51.0812011104540.843@faron.mitre.org> Date: Mon, 1 Dec 2008 11:05:01 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com Subject: Re: CVE request: kernel: fix soft lockups/OOM issues with unix garbage collector ====================================================== Name: CVE-2008-5300 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300 Reference: MLIST:[linux-netdev] 20081120 soft lockups/OOM after unix socket fixes Reference: URL:http://marc.info/?l=linux-netdev&m=122721862313564&w=2 Reference: MLIST:[linux-netdev] 20081125 [PATCH] Fix soft lockups/OOM issues w/ unix garbage collector Reference: URL:http://marc.info/?l=linux-netdev&m=122765505415944&w=2 Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=470201 Linux kernel 2.6.28 allows local users to cause a denial of service ("soft lockup" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.