CERT-In Vulnerability Note
CIVN-2012-0105
Linux Kernel ip_options Race Condition Vulnerability
Original Issue Date:October 15, 2012
Severity Rating: MEDIUM
Systems Affected
Overview
A vulnerability has been reported in Linux Kernel which could allow a remote or local attacker to cause Denial of Service (DoS) condition.
Description
The vulnerability occurs while sending packets to an application that sets socket options during the handling of network traffic. A local user could exploit a race condition while sending packets to an application to cause the target system to crash.
Depending on the network facing applications running on the system a remote attacker could Possibly exploit this vulnerability to cause a denial of service.
Solution
Apply the following source code fix:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f6d8bd051c391c1c0458a30b2a7abcd939329259
Vendor Information
kernal.org
http://www.kernel.org/
References
kernal.org
http://www.kernel.org/
Security Tracker
http://securitytracker.com/id/1027561
CVE Name
CVE-2012-3552
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|