Description: A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, remote users. Null-Pointer-Dereference in net/netfilter/nfnetlink_log.c Solution: Update to version 2.6.20.3
i can't see it among the other recent kernel bugs affecting the IP stack, it's #1 of http://secunia.com/advisories/24492/
I found it on "Heise" (a well known IT-News site in germany) had a quick look at the changelog and then searched bugzilla and didn't find anything there about this issue. I thought that I might have missed it, because I had been blind before... :/ *BUT* gentoo-sources-2.6.20 are still marked as unstable (http://packages.gentoo.org/search/?sstring=gentoo-sources) so I thought it might be useful to submit a request to do that. Sorry if I wasted your time, just intended to help the community to notice this issue.
Oh damn. It's already there, found it in the changelog. I'm sorry! Don't slap me too hard please, I hereby promise to search better next time. :/ Just curious: - is there a patch for 2.6.19 ? - shouldn't 2.6.20-r3 be marked stable?! I'm running a firewall on 2.6.19-r3 so I was a bit nervous about the issue. For others who might read this: echo "sys-kernel/gentoo-sources ~x86" >> /etc/portage/package.keywords && emerge -uD gentoo-sources and recompiling & rebooting does the trick.
nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) bridged packets, which trigger a NULL pointer dereference.