SB2005123104 - Memory corruption in Linux kernel
Published: December 31, 2005
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2005-4635)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages.
Remediation
Install update from vendor's website.
References
- http://secunia.com/advisories/18216
- http://secunia.com/advisories/18788
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea86575eaf99a9262a969309d934318028dbfacb
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
- http://www.novell.com/linux/security/advisories/2006_06_kernel.html
- http://www.securityfocus.com/bid/16139
- http://www.vupen.com/english/advisories/2006/0035