kernel
Page content
- Author: vmiklos
- Vulnerable: 2.6.22-7sayshell2
- Unaffected: 2.6.22-7sayshell3
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service).
- An error within the “wait_task_stopped()” function can be exploited to cause a DoS by manipulating the state of a child process while the parent is waiting for the state to change (e.g. the parent is inside “wait()” or “waitpid()”).
- An NULL-pointer dereference error exists within the “tcp_sacktag_write_queue()” function when processing ACK packets. This can be exploited to crash an affected system via specially crafted ACK packets.
- Bug Tracker URL: http://bugs.frugalware.org/task/2599