Secunia Security Advisory - A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
c1448671788db90cc9e0be174b3cc2bbbb7d0498828078c7c7e9b862a77280e2
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
----------------------------------------------------------------------
TITLE:
Linux Kernel "rt6_fill_node()" Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA31579
VERIFY ADVISORY:
http://secunia.com/advisories/31579/
CRITICAL:
Not critical
IMPACT:
DoS
WHERE:
Local system
OPERATING SYSTEM:
Linux Kernel 2.6.x
http://secunia.com/product/2719/
DESCRIPTION:
A vulnerability has been reported in the Linux kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).
The vulnerability is caused due to a NULL-pointer dereference error
within the "rt6_fill_node()" function in net/ipv6/route.c. This can
be exploited to trigger a kernel panic via an "ip route get"
command.
Successful exploitation requires that the IPv6 default route is not
set.
The vulnerability is reported in version 2.6.26.2. Other versions may
also be affected.
SOLUTION:
Fixed in the GIT repository.
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5e0115e500fe9dd2ca11e6f92db9123204f1327a
Restrict local access to trusted users only.
PROVIDED AND/OR DISCOVERED BY:
John Gumb
ORIGINAL ADVISORY:
http://lkml.org/lkml/2008/8/7/230
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------