SB2009092101 - Memory corruption in Linux kernel wireless
Published: September 21, 2009
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2009-3280)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption error within the cfg80211_bss_expire() function in net/wireless/scan.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fcc6cb0c13555e78c2d47257b6d1b5e59b0c419a
- http://patchwork.kernel.org/patch/45106/
- http://www.kernel.org/pub/linux/kernel/v2.6/stable-review/patch-2.6.31.1-rc1.bz2
- http://www.openwall.com/lists/oss-security/2009/09/16/2
- http://www.securityfocus.com/bid/36421