CVE-2011-1768 (retired)

Priority
Description
The tunnels implementation in the Linux kernel before 2.6.34, when tunnel
functionality is configured as a module, allows remote attackers to cause a
denial of service (OOPS) by sending a packet during module loading.
Ubuntu-Description
It was discovered that the IP/IP protocol incorrectly handled netns
initialization. A remote attacker could send a packet while the ipip module
was loading, and crash the system, leading to a denial of service.
Notes
 mdeslaur> redhat bug has a mention of a regression, need to check
 apw> the regression was triggered by a poor backport and fixed by
 apw> "Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels."
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Patches:
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
More Information

Updated: 2019-03-26 11:56:27 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)