[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2009-0778 kernel: rt_cache leak
From:       Eugene Teo <eugene () redhat ! com>
Date:       2009-03-11 1:01:15
Message-ID: 49B70D5B.5090503 () redhat ! com
[Download RAW message or body]

Reported by Hector Herrera:
A "REJECT" route in a software router (ip_forward = 1) based on CentOS 
5.2 will cause the kernel to lose track of cached routes.  Once the 
number of allocated route cache objects (as indicated by the value of 
ip_dst_cache in /proc/slabinfo) reaches the value of 
/proc/sys/net/ipv4/route/max_size - 1, the kernel will complain with a 
'dst cache overflow' errors for every received packet and all network 
connectivity will cease.

But was introduced in upstream commit 8b7817f3a95. It was later fixed in 
upstream commit 7c0ecc4c4f.

Workaround:
- either remove or replace the "REJECT" route with a different 
alternative such as 'ip route add 10.10.0.0/16 via 127.0.0.1'.
- using iptables.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-0778

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic