kernel

Page content
  • Author: Miklos Vajna
  • Vulnerable: 2.6.30-3
  • Unaffected: 2.6.30-4getorin1

This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (immediate OOPS and hang, complete loss of response, even of console). The vulnerability is caused due to an error within the “ip_defrag()” function in net/ipv4/ip_fragment.c, which may be exploited to cause a NULL pointer dereference by sending overly large packets to a vulnerable system.

CVEs: