CVE-2011-1768

Priority
Description
The tunnels implementation in the Linux kernel before 2.6.34, when tunnel
functionality is configured as a module, allows remote attackers to cause a
denial of service (OOPS) by sending a packet during module loading.
Ubuntu-Description
It was discovered that the IP/IP protocol incorrectly handled netns
initialization. A remote attacker could send a packet while the ipip module
was loading, and crash the system, leading to a denial of service.
Notes
mdeslaurredhat bug has a mention of a regression, need to check
apwthe regression was triggered by a poor backport and fixed by
"Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels."
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Patches:
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
Package
Upstream:released (2.6.34~rc1)
More Information

Updated: 2020-03-18 22:06:14 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)