Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 246359 (CVE-2008-5029) - Kernel: __scm_destroy in net/core/scm.c DOS (CVE-2008-5029)
Summary: Kernel: __scm_destroy in net/core/scm.c DOS (CVE-2008-5029)
Status: RESOLVED FIXED
Alias: CVE-2008-5029
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://cve.mitre.org/cgi-bin/cvename....
Whiteboard: [linux <2.6.25.20] [linux >=2.6.26 <2...
Keywords:
: 250399 (view as bug list)
Depends on:
Blocks:
 
Reported: 2008-11-11 00:25 UTC by Stefan Behte (RETIRED)
Modified: 2013-09-05 03:50 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2008-11-11 00:25:38 UTC
CVE-2008-5029 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5029):
  The __scm_destroy function in net/core/scm.c in the Linux kernel
  2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to
  itself through calls to the fput function, which allows local users
  to cause a denial of service (panic) via vectors related to sending
  an SCM_RIGHTS message through a UNIX domain socket and closing file
  descriptors.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-12-17 16:51:14 UTC
*** Bug 250399 has been marked as a duplicate of this bug. ***
Comment 2 Kerin Millar 2009-07-21 03:34:17 UTC
Populated Status Whiteboard. Here's the upstream patch:

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8d570a4

Should this patch be applied independently, it is also strongly recommended to apply this related patch:

"scm: fix scm_fp_list->list initialization made in wrong place"
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=5421ae0153b4ba0469967cfd8de96144e3bf3979

hardened-kernel unaffected at present time. Removing alias.

PS: genpatches-2.6.26-4 added 2.6.26.8. genpatches-2.6.27-5 added 2.6.27.5. =genpatches-2.6.25* remains vulnerable. However, hardened-sources-2.6.25-r13 does not because we independently folded in the newest stable patches.