kernel

Page content
  • Author: Miklos Vajna
  • Vulnerable: 2.6.26-2solaria1
  • Unaffected: 2.6.26-2solaria2

A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to the “svc_listen()” function in net/atm/svc.c allowing users to create unassigned PVC/SVC entries by calling the function multiple times on a socket. This can be exploited to trigger an infinite loop within the “__vcc_walk()” function in net/atm/proc.c by creating unassigned entries and then e.g. reading from /proc/net/atm/vc.

CVEs: