kernel

Page content
  • Author: voroskoi
  • Vulnerable: 2.6.20-5terminus2
  • Unaffected: 2.6.20-5terminus3

Two vulnerabilities and a security issue have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

  1. An error exists within the processing of packets with IPv6 type 0 route headers. This can be exploited to cause a DoS due to high network traffic by sending specially crafted IPv6 packets to vulnerable systems.
  2. A boundary error due to the use of RTA_MAX instead of RTN_MAX in dn_fib_props[] within dn_fib.c and in fib_props[] within fib_semantics.c can potentially be exploited to cause a DoS.
  3. The vulnerability is caused due to an error within the handling of NETLINK_FIB_LOOKUP reply messages. This can be exploited to cause an infinite recursion, which could result in a stack overflow.

CVEs: