Lucene search

K
nvd[email protected]NVD:CVE-2008-5029
HistoryNov 10, 2008 - 4:15 p.m.

CVE-2008-5029

2008-11-1016:15:12
web.nvd.nist.gov
1

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.1%

The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.27.4
OR
linuxlinux_kernelMatch2.2.27
OR
linuxlinux_kernelMatch2.4.36
OR
linuxlinux_kernelMatch2.4.36.1
OR
linuxlinux_kernelMatch2.4.36.2
OR
linuxlinux_kernelMatch2.4.36.3
OR
linuxlinux_kernelMatch2.4.36.4
OR
linuxlinux_kernelMatch2.4.36.5
OR
linuxlinux_kernelMatch2.4.36.6
OR
linuxlinux_kernelMatch2.6
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18rc1
OR
linuxlinux_kernelMatch2.6.18rc2
OR
linuxlinux_kernelMatch2.6.18rc3
OR
linuxlinux_kernelMatch2.6.18rc4
OR
linuxlinux_kernelMatch2.6.18rc5
OR
linuxlinux_kernelMatch2.6.18rc6
OR
linuxlinux_kernelMatch2.6.18rc7
OR
linuxlinux_kernelMatch2.6.19.4
OR
linuxlinux_kernelMatch2.6.19.5
OR
linuxlinux_kernelMatch2.6.19.6
OR
linuxlinux_kernelMatch2.6.19.7
OR
linuxlinux_kernelMatch2.6.20.16
OR
linuxlinux_kernelMatch2.6.20.17
OR
linuxlinux_kernelMatch2.6.20.18
OR
linuxlinux_kernelMatch2.6.20.19
OR
linuxlinux_kernelMatch2.6.20.20
OR
linuxlinux_kernelMatch2.6.20.21
OR
linuxlinux_kernelMatch2.6.21.5
OR
linuxlinux_kernelMatch2.6.21.6
OR
linuxlinux_kernelMatch2.6.21.7
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22.1
OR
linuxlinux_kernelMatch2.6.22.2
OR
linuxlinux_kernelMatch2.6.22.8
OR
linuxlinux_kernelMatch2.6.22.9
OR
linuxlinux_kernelMatch2.6.22.10
OR
linuxlinux_kernelMatch2.6.22.11
OR
linuxlinux_kernelMatch2.6.22.12
OR
linuxlinux_kernelMatch2.6.22.13
OR
linuxlinux_kernelMatch2.6.22.14
OR
linuxlinux_kernelMatch2.6.22.15
OR
linuxlinux_kernelMatch2.6.22.17
OR
linuxlinux_kernelMatch2.6.22.18
OR
linuxlinux_kernelMatch2.6.22.19
OR
linuxlinux_kernelMatch2.6.22.20
OR
linuxlinux_kernelMatch2.6.22.21
OR
linuxlinux_kernelMatch2.6.22.22
OR
linuxlinux_kernelMatch2.6.22_rc1
OR
linuxlinux_kernelMatch2.6.22_rc7
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23.8
OR
linuxlinux_kernelMatch2.6.23.9
OR
linuxlinux_kernelMatch2.6.23.10
OR
linuxlinux_kernelMatch2.6.23.11
OR
linuxlinux_kernelMatch2.6.23.12
OR
linuxlinux_kernelMatch2.6.23.13
OR
linuxlinux_kernelMatch2.6.23.15
OR
linuxlinux_kernelMatch2.6.23.16
OR
linuxlinux_kernelMatch2.6.23.17
OR
linuxlinux_kernelMatch2.6.23_rc1
OR
linuxlinux_kernelMatch2.6.24
OR
linuxlinux_kernelMatch2.6.24.1
OR
linuxlinux_kernelMatch2.6.24.2
OR
linuxlinux_kernelMatch2.6.24.3
OR
linuxlinux_kernelMatch2.6.24.4
OR
linuxlinux_kernelMatch2.6.24.5
OR
linuxlinux_kernelMatch2.6.24.6
OR
linuxlinux_kernelMatch2.6.24.7
OR
linuxlinux_kernelMatch2.6.24_rc1
OR
linuxlinux_kernelMatch2.6.24_rc4
OR
linuxlinux_kernelMatch2.6.24_rc5
OR
linuxlinux_kernelMatch2.6.25
OR
linuxlinux_kernelMatch2.6.25x86_64
OR
linuxlinux_kernelMatch2.6.25.1
OR
linuxlinux_kernelMatch2.6.25.1x86_64
OR
linuxlinux_kernelMatch2.6.25.2
OR
linuxlinux_kernelMatch2.6.25.2x86_64
OR
linuxlinux_kernelMatch2.6.25.3
OR
linuxlinux_kernelMatch2.6.25.3x86_64
OR
linuxlinux_kernelMatch2.6.25.4
OR
linuxlinux_kernelMatch2.6.25.4x86_64
OR
linuxlinux_kernelMatch2.6.25.5
OR
linuxlinux_kernelMatch2.6.25.5x86_64
OR
linuxlinux_kernelMatch2.6.25.6
OR
linuxlinux_kernelMatch2.6.25.6x86_64
OR
linuxlinux_kernelMatch2.6.25.7
OR
linuxlinux_kernelMatch2.6.25.7x86_64
OR
linuxlinux_kernelMatch2.6.25.8
OR
linuxlinux_kernelMatch2.6.25.8x86_64
OR
linuxlinux_kernelMatch2.6.25.9
OR
linuxlinux_kernelMatch2.6.25.9x86_64
OR
linuxlinux_kernelMatch2.6.25.10
OR
linuxlinux_kernelMatch2.6.25.10x86_64
OR
linuxlinux_kernelMatch2.6.25.11
OR
linuxlinux_kernelMatch2.6.25.11x86_64
OR
linuxlinux_kernelMatch2.6.25.12
OR
linuxlinux_kernelMatch2.6.25.12x86_64
OR
linuxlinux_kernelMatch2.6.25.13
OR
linuxlinux_kernelMatch2.6.25.14
OR
linuxlinux_kernelMatch2.6.25.15
OR
linuxlinux_kernelMatch2.6.25.16
OR
linuxlinux_kernelMatch2.6.25.17
OR
linuxlinux_kernelMatch2.6.26
OR
linuxlinux_kernelMatch2.6.26rc4
OR
linuxlinux_kernelMatch2.6.26.1
OR
linuxlinux_kernelMatch2.6.26.2
OR
linuxlinux_kernelMatch2.6.26.3
OR
linuxlinux_kernelMatch2.6.26.4
OR
linuxlinux_kernelMatch2.6.26.5
OR
linuxlinux_kernelMatch2.6.27
OR
linuxlinux_kernelMatch2.6.27.1
OR
linuxlinux_kernelMatch2.6.27.2
OR
linuxlinux_kernelMatch2.6.27.3

References

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.1%