kernel
Page content
- Author: Miklos Vajna
- Vulnerable: 2.6.26-2solaria1
- Unaffected: 2.6.26-2solaria2
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to the “svc_listen()” function in net/atm/svc.c allowing users to create unassigned PVC/SVC entries by calling the function multiple times on a socket. This can be exploited to trigger an infinite loop within the “__vcc_walk()” function in net/atm/proc.c by creating unassigned entries and then e.g. reading from /proc/net/atm/vc.
- Bug Tracker URL: http://bugs.frugalware.org/task/3527