SB2005102104 - Null pointer dereference in Linux kernel
Published: October 21, 2005
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Null pointer dereference (CVE-ID: CVE-2005-3274)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
Remediation
Install update from vendor's website.
References
- http://lkml.org/lkml/2005/6/23/249
- http://lkml.org/lkml/2005/6/24/173
- http://www.securityfocus.com/bid/15528
- http://www.debian.org/security/2005/dsa-922
- http://secunia.com/advisories/18056
- http://www.redhat.com/support/errata/RHSA-2006-0190.html
- http://secunia.com/advisories/18684
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
- http://secunia.com/advisories/18977
- http://secunia.com/advisories/17826
- http://www.redhat.com/support/errata/RHSA-2005-663.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
- https://usn.ubuntu.com/219-1/
- http://www.securityfocus.com/archive/1/427981/100/0/threaded
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d