SB2006120701 - Memory corruption in Linux kernel
Published: December 7, 2006
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2006-6333)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The tr_rx function in ibmtr.c for Linux kernel 2.6.19 assigns the wrong flag to the ip_summed field, which allows remote attackers to cause a denial of service (memory corruption) via crafted packets that cause the kernel to interpret another field as an offset.
Remediation
Install update from vendor's website.
References
- http://secunia.com/advisories/23254
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0d97e10ccac580e16d3dffbe4a9a88144360e64a;hp=bfe59865b1dd50e5c4dbd4cefe506a31e1495a1a;hb=ee28b0da1069ced1688aa9d0b7b378353b988321;f=drivers/net/tokenring/ibmtr.c
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ee28b0da1069ced1688aa9d0b7b378353b988321
- http://www.securityfocus.com/bid/21490
- http://www.vupen.com/english/advisories/2006/4907