net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373 - Exploit, Mailing List, Third Party Advisory | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f - | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712 - | |
References | () http://ie.archive.ubuntu.com/linux/kernel/v2.6/ChangeLog-2.6.33 - Broken Link | |
References | () http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 - Broken Link | |
References | () http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f - | |
References | () http://patchwork.ozlabs.org/patch/88217/ - Mailing List, Patch, Third Party Advisory | |
References | () http://www.debian.org/security/2011/dsa-2305 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2011/06/06/10 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2011/06/06/20 - Mailing List, Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1288-1 - Third Party Advisory | |
References | () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095 - Exploit, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=711134 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=711245 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2011-10-10 10:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-2189
Mitre link : CVE-2011-2189
CVE.ORG link : CVE-2011-2189
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_mrg
- enterprise_linux
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-400
Uncontrolled Resource Consumption