Computer Security
[EN] securityvulns.ru no-pyccku


Linux kernel DoS
Published:04.01.2009
Source:
SecurityVulns ID:9555
Type:local
Threat Level:
5/10
Description:Race conditions during socket message input/ouput processing on Unix sockets.
Affected:LINUX : kernel 2.6
CVE:CVE-2008-5029 (The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.)
Original documentdocumentjoris_(at)_infogroep.be, Re: Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit (04.01.2009)
 documenti9p_(at)_hotmail.fr, Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit (04.01.2009)
Files:Linux Kernel denial of service exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod