kernel
Page content
- Author: Miklos Vajna
- Vulnerable: 2.6.30-3
- Unaffected: 2.6.30-4getorin1
This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (immediate OOPS and hang, complete loss of response, even of console). The vulnerability is caused due to an error within the “ip_defrag()” function in net/ipv4/ip_fragment.c, which may be exploited to cause a NULL pointer dereference by sending overly large packets to a vulnerable system.
- Bug Tracker URL: http://bugs.frugalware.org/task/4047