Affected system:
Linux kernel 2.6.7
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1-rc2
Linux kernel 2.6.1-rc1
Linux kernel 2.6.1
Linux kernel 2.6
Linux kernel 2.4.9
Linux kernel 2.4.8
Linux Kernel 2.4.7
Linux kernel 2.4.6
Linux kernel 2.4.5
Linux kernel 2.4.4
Linux kernel 2.4.3
Linux kernel 2.4.27-pre2
Linux kernel 2.4.27-pre1
Linux kernel 2.4.26
Linux kernel 2.4.25
Linux kernel 2.4.24
Linux kernel 2.4.23
Linux kernel 2.4.22
Linux kernel 2.4.21
Linux Kernel 2.4.20
Linux Kernel 2.4.2
Linux kernel 2.4.19
Linux kernel 2.4.18
Linux kernel 2.4.17
Linux kernel 2.4.16
Linux Kernel 2.4.15
Linux Kernel 2.4.14
Linux Kernel 2.4.13
Linux Kernel 2.4.12
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux Kernel 2.4.1
Linux Kernel 2.4
Detailed Description:
Linux Kernel is an open source operating system.
Linux kernel contains an integer overflow, and remote attackers can use this vulnerability to make the KNFSD service crash.
The remote attacker forgery the source address to send a write request package containing a size of more than 2 ^ 31, which can lead to a nuclear issue, causing a reject service attack, and is not clear whether or not any directive can be performed.
Patch download:
S.U.S.E. A security announcement has been released (SUSE-SA: 2004: 028) and the corresponding patch:
SUSE-SA: 2004: 028: kernel
From:
Kingsoft.com