Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
- http://www.redhat.com/support/errata/RHSA-2003-239.html
No PoCs found on GitHub currently.