CVE-2011-1768

Priority
Description
The tunnels implementation in the Linux kernel before 2.6.34, when tunnel
functionality is configured as a module, allows remote attackers to cause a
denial of service (OOPS) by sending a packet during module loading.
Ubuntu-Description
It was discovered that the IP/IP protocol incorrectly handled netns
initialization. A remote attacker could send a packet while the ipip module
was loading, and crash the system, leading to a denial of service.
Notes
mdeslaurredhat bug has a mention of a regression, need to check
apwthe regression was triggered by a poor backport and fixed by
"Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels."
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Patches:
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
More Information

Updated: 2019-12-05 20:57:03 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)