Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 21 Nov 2008 12:00:24 -0700
From: dann frazier <dannf@...ian.org>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: Unix sockets kernel panic

On Tue, Nov 11, 2008 at 05:41:44PM +0800, Eugene Teo wrote:
> Eugene Teo wrote:
> > We need a CVE name for this issue. This was reported in netdev today.
> > 
> > "The following code causes a kernel panic on Linux 2.6.26:
> > http://darkircop.org/unix.c
> > 
> > I haven't investigated the bug so I'm not sure what is causing it, and
> > don't know if it's exploitable.  The code passes unix sockets from one
> > process to another using unix sockets.  The bug probably has to do
> > with closing file descriptors."
> > 
> > http://marc.info/?l=linux-netdev&m=122593044330973&w=2
> > https://bugzilla.redhat.com/show_bug.cgi?id=470201
> > 
> > There isn't a fix yet. Dave is working on it.
> 
> There's a fix now.
> 
> Upstream commits: f8d570a, 3b53fbf, and 6209344.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=470201#c10
> https://bugzilla.redhat.com/show_bug.cgi?id=470201#c14
> https://bugzilla.redhat.com/show_bug.cgi?id=470201#c9
> https://bugzilla.redhat.com/show_bug.cgi?id=470201#c13

Thanks for following up.

fyi, our testing of this fix has uncovered additional issues.
Local/unprivileged users can cause soft lockups and take out system
processes by triggering the OOM killer:
  http://marc.info/?l=linux-netdev&m=122721862313564&w=2

-- 
dann frazier

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.