kernel
Page content
- Author: voroskoi
- Vulnerable: 2.6.20-5terminus2
- Unaffected: 2.6.20-5terminus3
Two vulnerabilities and a security issue have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
- An error exists within the processing of packets with IPv6 type 0 route headers. This can be exploited to cause a DoS due to high network traffic by sending specially crafted IPv6 packets to vulnerable systems.
- A boundary error due to the use of RTA_MAX instead of RTN_MAX in dn_fib_props[] within dn_fib.c and in fib_props[] within fib_semantics.c can potentially be exploited to cause a DoS.
- The vulnerability is caused due to an error within the handling of NETLINK_FIB_LOOKUP reply messages. This can be exploited to cause an infinite recursion, which could result in a stack overflow.
- Bug Tracker URL: http://bugs.frugalware.org/task/2006