Article

Gentoo fixes Linux kernel flaw

Michael S. Mimoso, Editorial Director

Gentoo has fixed a vulnerability in the Linux kernel 2.6 series that could be exploited for a remote denial-of-service attack. The company calls this a "high-impact" flaw and recommends users get the security update outlined in its advisory.

    Requires Free Membership to View

The advisory said the security hole allows an attacker to send a malformed TCP packet. "By sending one malformed packet, the kernel could get stuck in a loop, consuming all of the CPU resources and rendering the machine useless, causing a denial of service," the advisory said. "This vulnerability requires no local access."

Asked if an exploit of the flaw would put data at risk, Gentoo Linux X86 Core and Kernel Team member Tim Yamin said in an e-mail, "No data would be lost as such. But if fresh data is in the kernel's buffers and not yet written to disk[s] it may be lost if the kernel does not come out of the infinite loop."

Asked if the workaround would deprive the user of valuable services, Yamin said, "The workaround only requires any '--tcp-option' rules to be removed. This may be a disadvantage to some who need them, but this would not deny any services unless those rules perform packet forwarding to other destinations, for example. As a result, we urged all our users to upgrade to patched kernels in the GLSA, especially those who rely on '--tcp-option' rules."

Yamin said the flaw was discovered June 30. A customer then reported it to Gentoo, and the company's security team received a notification when the bug was opened. He said everything was patched by July 3.

The Linux kernel manages the core aspects of a GNU/Linux system, providing an interface for core system applications and providing the essential structure and capability to access hardware that is needed for a running system, Gentoo said.

In its advisory, Coppenhagen, Denmark-based IT security firm Secunia called the flaw "moderately critical."


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: