CVE-2011-2699
Published: 16 August 2011
The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
From the Ubuntu security team
Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote attacker could exploit this to exhaust network resources, leading to a denial of service.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
Patches: Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Fixed by 87c48fa3b4630905f98268dde838ee43626a060c |
||
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
linux-lts-backport-oneiric Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1~rc1)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2699
- https://usn.ubuntu.com/usn/usn-1202-1
- https://usn.ubuntu.com/usn/usn-1204-1
- https://usn.ubuntu.com/usn/usn-1212-1
- https://usn.ubuntu.com/usn/usn-1211-1
- https://usn.ubuntu.com/usn/usn-1219-1
- https://usn.ubuntu.com/usn/usn-1225-1
- https://usn.ubuntu.com/usn/usn-1227-1
- https://usn.ubuntu.com/usn/usn-1239-1
- https://usn.ubuntu.com/usn/usn-1245-1
- https://usn.ubuntu.com/usn/usn-1240-1
- https://usn.ubuntu.com/usn/usn-1253-1
- https://usn.ubuntu.com/usn/usn-1256-1
- NVD
- Launchpad
- Debian