CVE-2011-2189

net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373 Exploit Mailing List Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712
http://ie.archive.ubuntu.com/linux/kernel/v2.6/ChangeLog-2.6.33 Broken Link
http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 Broken Link
http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f
http://patchwork.ozlabs.org/patch/88217/ Mailing List Patch Third Party Advisory
http://www.debian.org/security/2011/dsa-2305 Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/06/06/10 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/06/06/20 Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-1288-1 Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095 Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=711134 Exploit Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=711245 Exploit Issue Tracking Patch Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373 Exploit Mailing List Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712
http://ie.archive.ubuntu.com/linux/kernel/v2.6/ChangeLog-2.6.33 Broken Link
http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 Broken Link
http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f
http://patchwork.ozlabs.org/patch/88217/ Mailing List Patch Third Party Advisory
http://www.debian.org/security/2011/dsa-2305 Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/06/06/10 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/06/06/20 Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-1288-1 Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095 Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=711134 Exploit Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=711245 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:27

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373 - Exploit, Mailing List, Third Party Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373 - Exploit, Mailing List, Third Party Advisory
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f -
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712 -
References () http://ie.archive.ubuntu.com/linux/kernel/v2.6/ChangeLog-2.6.33 - Broken Link () http://ie.archive.ubuntu.com/linux/kernel/v2.6/ChangeLog-2.6.33 - Broken Link
References () http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 - Broken Link () http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 - Broken Link
References () http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f - () http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f -
References () http://patchwork.ozlabs.org/patch/88217/ - Mailing List, Patch, Third Party Advisory () http://patchwork.ozlabs.org/patch/88217/ - Mailing List, Patch, Third Party Advisory
References () http://www.debian.org/security/2011/dsa-2305 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2305 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/06/06/10 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/06/06/10 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/06/06/20 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/06/06/20 - Mailing List, Third Party Advisory
References () http://www.ubuntu.com/usn/USN-1288-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1288-1 - Third Party Advisory
References () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095 - Exploit, Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095 - Exploit, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=711134 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=711134 - Exploit, Issue Tracking, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=711245 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=711245 - Exploit, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2011-10-10 10:55

Updated : 2024-11-21 01:27


NVD link : CVE-2011-2189

Mitre link : CVE-2011-2189

CVE.ORG link : CVE-2011-2189


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_mrg
  • enterprise_linux

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption