Description: A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. The vulnerability is due to a NULL pointer dereference within the "ipv6_getsockopt_sticky()" function in net/ipv6/ipv6_sockglue.c. This can be exploited to crash the kernel or disclose kernel memory. The vulnerability is reported in versions prior to 2.6.20.2. Solution: Update to version 2.6.20.2. Provided and/or discovered by: Reported by an anonymous person. Original Advisory: http://bugzilla.kernel.org/show_bug.cgi?id=8134 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.2
*** Bug 170878 has been marked as a duplicate of this bug. ***
Don't see anything useful in keeping this bug open...