CVE-2008-5029 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5029): The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
*** Bug 250399 has been marked as a duplicate of this bug. ***
Populated Status Whiteboard. Here's the upstream patch: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8d570a4 Should this patch be applied independently, it is also strongly recommended to apply this related patch: "scm: fix scm_fp_list->list initialization made in wrong place" http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=5421ae0153b4ba0469967cfd8de96144e3bf3979 hardened-kernel unaffected at present time. Removing alias. PS: genpatches-2.6.26-4 added 2.6.26.8. genpatches-2.6.27-5 added 2.6.27.5. =genpatches-2.6.25* remains vulnerable. However, hardened-sources-2.6.25-r13 does not because we independently folded in the newest stable patches.