Vulnerability Description
A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing "emergency" in which a hash chain is too long. NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.18 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Virtualization | 5.0 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 5.4 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Workstation | 5.0 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken Link
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken Link
- http://support.avaya.com/css/P8/documents/100073666Third Party Advisory
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31Broken Link
- http://www.openwall.com/lists/oss-security/2010/01/20/1Mailing List
- http://www.openwall.com/lists/oss-security/2010/01/20/6Mailing List
- https://bugzilla.redhat.com/show_bug.cgi?id=545411ExploitIssue Tracking
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55808Third Party AdvisoryVDB Entry
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Broken Link
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Broken Link
- https://rhn.redhat.com/errata/RHSA-2010-0046.htmlVendor Advisory
- https://rhn.redhat.com/errata/RHSA-2010-0095.htmlVendor Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken Link
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken Link
- http://support.avaya.com/css/P8/documents/100073666Third Party Advisory
FAQ
What is CVE-2009-4272?
CVE-2009-4272 is a vulnerability with a CVSS score of 7.5 (HIGH). A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that fo...
How severe is CVE-2009-4272?
CVE-2009-4272 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4272?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Redhat Virtualization, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.