Summary: | Kernel: __scm_destroy in net/core/scm.c DOS (CVE-2008-5029) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | kernel, kuba |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029 | ||
Whiteboard: | [linux <2.6.25.20] [linux >=2.6.26 <2.6.26.8] [linux >=2.6.27 <2.6.27.5] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
2008-11-11 00:25:38 UTC
*** Bug 250399 has been marked as a duplicate of this bug. *** Populated Status Whiteboard. Here's the upstream patch: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8d570a4 Should this patch be applied independently, it is also strongly recommended to apply this related patch: "scm: fix scm_fp_list->list initialization made in wrong place" http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=5421ae0153b4ba0469967cfd8de96144e3bf3979 hardened-kernel unaffected at present time. Removing alias. PS: genpatches-2.6.26-4 added 2.6.26.8. genpatches-2.6.27-5 added 2.6.27.5. =genpatches-2.6.25* remains vulnerable. However, hardened-sources-2.6.25-r13 does not because we independently folded in the newest stable patches. |