[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Savannah-hackers] http://www.secunia.com/advisories/8786/
From: |
Mathieu Roy |
Subject: |
[Savannah-hackers] http://www.secunia.com/advisories/8786/ |
Date: |
21 May 2003 17:59:30 +0200 |
User-agent: |
Gnus/5.09 (Gnus v5.9.0) Emacs/21.3 |
Are GNU Machines updated regarding this bug?
http://www.secunia.com/advisories/8786/
Description:
A vulnerability has been identified in the Linux Kernel 2.4 branch, which can
be exploited by malicious people to cause a Denial of Service condition.
The problem is the way that the Linux Kernel handles caching of routing
information. By flooding a Linux system with packets with spoofed source
addresses, the handling of the cache will consume large amounts of CPU power.
This could potentially bring a Linux system offline with a rate of only 400
packets per second by using carefully chosen source addresses that causes hash
collisions in the table.
A Denial of Service could still be performed if the system uses iptables
(netfilter) to filter traffic. This is even possible with randomly chosen IP
addresses that doesn't cause a hash collision, since it just requires a higher
rate of packets.
For further details about how this feature back fired see "Other References".
Solution:
We are not aware of an official patch or update for the Linux Kernel.
A temporary workaround could be to filter traffic using the PREROUTING chain
instead of the INPUT chain in iptables, as PREROUTING is performed before the
route cache. This would only require minor changes to the filter rules.
Red Hat has issued updated kernel packages. These also fix certain non-security
related issues (see Red Hat advisory for details):
--
Mathieu Roy
Homepage:
http://yeupou.coleumes.org
Not a native english speaker:
http://stock.coleumes.org/doc.php?i=/misc-files/flawed-english
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Savannah-hackers] http://www.secunia.com/advisories/8786/,
Mathieu Roy <=