CVE-2011-2699

Published: 16 August 2011

The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.

From the Ubuntu security team

Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote attacker could exploit this to exhaust network resources, leading to a denial of service.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 87c48fa3b4630905f98268dde838ee43626a060c
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)