Release date:
Updated on:
Affected Systems:
Linux kernel 2.6.24.3-2.6.37
Description:
--------------------------------------------------------------------------------
Bugtraq id: 45037
Linux Kernel is the Kernel used by open source Linux.
Linux Kernel has a vulnerability in implementation. Attackers can exploit this vulnerability to cause the Kernel to consume a large amount of memory and cause DOS.
For example, a Unix socket is used by two processes to exchange data. By connecting to a specific file, if the file name starts with a NULL byte ('\ 0'), the file will not be stored in the file system, however, the abstract space is used in the kernel. The shutdown () function is used to close the action on the socket. When a Unix socket uses Abstract space and shutdown () to close the socket, a local attacker can connect to the socket before calling close. But because it is partially disabled, there will be an infinite loop in the kernel to lock the system.
Linux kernel 2.6.35 is affected, and other versions may be affected.
<* Source: Vegard Nossum
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Linux
-----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.kernel.org/