CVE-2008-5300

Publication date 1 December 2008

Last updated 24 July 2024


Ubuntu priority

Linux kernel 2.6.28 allows local users to cause a denial of service ("soft lockup" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.

From the Ubuntu Security Team

Dann Frazier discovered that in certain situations sendmsg did not correctly release allocated memory. A local attacker could exploit this to force the system to run out of free memory, leading to a denial of service.

Status

Package Ubuntu Release Status
linux 8.10 intrepid
Fixed 2.6.27-11.27
8.04 LTS hardy
Fixed 2.6.24-23.48
7.10 gutsy Not in release
6.06 LTS dapper Not in release
linux-source-2.6.15 8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy Not in release
6.06 LTS dapper
Fixed 2.6.15-53.75
linux-source-2.6.22 8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy
Fixed 2.6.22-16.61
6.06 LTS dapper Not in release

References

Related Ubuntu Security Notices (USN)

    • USN-715-1
    • Linux kernel vulnerabilities
    • 29 January 2009
    • USN-714-1
    • Linux kernel vulnerabilities
    • 29 January 2009

Other references