CVE-2011-2699

Priority
Low
Description
The IPv6 implementation in the Linux kernel before 3.1 does not generate
Fragment Identification values separately for each destination, which makes
it easier for remote attackers to cause a denial of service (disrupted
networking) by predicting these values and sending crafted packets.
Ubuntu-Description
Fernando Gont discovered that the IPv6 stack used predictable fragment
identification numbers. A remote attacker could exploit this to exhaust
network resources, leading to a denial of service.
References
Bugs
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.1~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2Fixed by 87c48fa3b4630905f98268dde838ee43626a060c
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
More Information

Updated: 2018-06-26 04:41:43 UTC (commit 7799c934cca373482531a7b00e4dfe82302ceae5)