The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | - | 2.6.34 |
| vmware / esx | 4.1 | 4.1.x |
| vmware / esx | 4.0 | 4.0.x |
| redhat / enterprise_linux | 4.0 | 4.0.x |