For IPv6 over IPv4 tunnel device - Simple Internet Transition (SIT), an exploitable remote memory leak happens when pskb_may_pull() fails in function ipip6_rcv() in net/ipv6/sit.c.
Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2136 IDENTIFIER = WIND00123369
WIND00123370.zip for 2.0
WIND00124695.zip for 1.4
WIND00124696.zip for 1.5
1. Unzip the patch under [install_dir]/updates
2. Install the patch CD by entering the patch CD directory and run setup_linux.
3. This is a source only patch so you will have to build the kernel
4. Issue a make fs and make the kernel in a configured directory.
5. Upload the kernel and rootfs into the target and boot it up.