CVE-2008-5300

Linux kernel 2.6.28 allows local users to cause a denial of service ("soft lockup" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=473259
http://marc.info/?l=linux-netdev&m=122721862313564&w=2
http://marc.info/?l=linux-netdev&m=122765505415944&w=2
http://osvdb.org/50272
http://secunia.com/advisories/32913
http://secunia.com/advisories/32998
http://secunia.com/advisories/33083
http://secunia.com/advisories/33348
http://secunia.com/advisories/33556
http://secunia.com/advisories/33706
http://secunia.com/advisories/33756
http://secunia.com/advisories/33854
http://securityreason.com/securityalert/4673
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332
http://www.debian.org/security/2008/dsa-1681
http://www.mandriva.com/security/advisories?name=MDVSA-2009:032
http://www.redhat.com/support/errata/RHSA-2009-0014.html
http://www.redhat.com/support/errata/RHSA-2009-0053.html
http://www.securityfocus.com/archive/1/499044/100/0/threaded
http://www.securityfocus.com/archive/1/512019/100/0/threaded
http://www.securityfocus.com/bid/32516
http://www.ubuntu.com/usn/usn-715-1
https://bugzilla.redhat.com/show_bug.cgi?id=470201 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46943
https://issues.rpath.com/browse/RPL-2915
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10283
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11427
https://rhn.redhat.com/errata/RHSA-2009-1550.html
https://usn.ubuntu.com/714-1/
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=473259
http://marc.info/?l=linux-netdev&m=122721862313564&w=2
http://marc.info/?l=linux-netdev&m=122765505415944&w=2
http://osvdb.org/50272
http://secunia.com/advisories/32913
http://secunia.com/advisories/32998
http://secunia.com/advisories/33083
http://secunia.com/advisories/33348
http://secunia.com/advisories/33556
http://secunia.com/advisories/33706
http://secunia.com/advisories/33756
http://secunia.com/advisories/33854
http://securityreason.com/securityalert/4673
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332
http://www.debian.org/security/2008/dsa-1681
http://www.mandriva.com/security/advisories?name=MDVSA-2009:032
http://www.redhat.com/support/errata/RHSA-2009-0014.html
http://www.redhat.com/support/errata/RHSA-2009-0053.html
http://www.securityfocus.com/archive/1/499044/100/0/threaded
http://www.securityfocus.com/archive/1/512019/100/0/threaded
http://www.securityfocus.com/bid/32516
http://www.ubuntu.com/usn/usn-715-1
https://bugzilla.redhat.com/show_bug.cgi?id=470201 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46943
https://issues.rpath.com/browse/RPL-2915
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10283
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11427
https://rhn.redhat.com/errata/RHSA-2009-1550.html
https://usn.ubuntu.com/714-1/
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=473259 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=473259 -
References () http://marc.info/?l=linux-netdev&m=122721862313564&w=2 - () http://marc.info/?l=linux-netdev&m=122721862313564&w=2 -
References () http://marc.info/?l=linux-netdev&m=122765505415944&w=2 - () http://marc.info/?l=linux-netdev&m=122765505415944&w=2 -
References () http://osvdb.org/50272 - () http://osvdb.org/50272 -
References () http://secunia.com/advisories/32913 - () http://secunia.com/advisories/32913 -
References () http://secunia.com/advisories/32998 - () http://secunia.com/advisories/32998 -
References () http://secunia.com/advisories/33083 - () http://secunia.com/advisories/33083 -
References () http://secunia.com/advisories/33348 - () http://secunia.com/advisories/33348 -
References () http://secunia.com/advisories/33556 - () http://secunia.com/advisories/33556 -
References () http://secunia.com/advisories/33706 - () http://secunia.com/advisories/33706 -
References () http://secunia.com/advisories/33756 - () http://secunia.com/advisories/33756 -
References () http://secunia.com/advisories/33854 - () http://secunia.com/advisories/33854 -
References () http://securityreason.com/securityalert/4673 - () http://securityreason.com/securityalert/4673 -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332 - () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332 -
References () http://www.debian.org/security/2008/dsa-1681 - () http://www.debian.org/security/2008/dsa-1681 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:032 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:032 -
References () http://www.redhat.com/support/errata/RHSA-2009-0014.html - () http://www.redhat.com/support/errata/RHSA-2009-0014.html -
References () http://www.redhat.com/support/errata/RHSA-2009-0053.html - () http://www.redhat.com/support/errata/RHSA-2009-0053.html -
References () http://www.securityfocus.com/archive/1/499044/100/0/threaded - () http://www.securityfocus.com/archive/1/499044/100/0/threaded -
References () http://www.securityfocus.com/archive/1/512019/100/0/threaded - () http://www.securityfocus.com/archive/1/512019/100/0/threaded -
References () http://www.securityfocus.com/bid/32516 - () http://www.securityfocus.com/bid/32516 -
References () http://www.ubuntu.com/usn/usn-715-1 - () http://www.ubuntu.com/usn/usn-715-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=470201 - Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=470201 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46943 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46943 -
References () https://issues.rpath.com/browse/RPL-2915 - () https://issues.rpath.com/browse/RPL-2915 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10283 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10283 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11427 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11427 -
References () https://rhn.redhat.com/errata/RHSA-2009-1550.html - () https://rhn.redhat.com/errata/RHSA-2009-1550.html -
References () https://usn.ubuntu.com/714-1/ - () https://usn.ubuntu.com/714-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html - () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html -

Information

Published : 2008-12-01 17:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5300

Mitre link : CVE-2008-5300

CVE.ORG link : CVE-2008-5300


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors