CVE-2011-2189

NameCVE-2011-2189
Descriptionnet/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
NVD severityhigh (attack range: remote)
Debian Bugs629373
Debian/oldoldstablepackage linux-2.6 is vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux-2.6 (PTS)squeeze, squeeze (security)2.6.32-48squeeze6vulnerable
squeeze (lts)2.6.32-48squeeze13vulnerable
vsftpd (PTS)squeeze, squeeze (security)2.3.2-3+squeeze2fixed
wheezy2.3.5-3fixed
jessie3.0.2-17fixed
stretch, sid3.0.2-20fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linux-2.6source(unstable)2.6.35-1low
vsftpdsource(unstable)2.3.4-1high629373
vsftpdsourcelenny2.0.7-1+lenny1high
vsftpdsourcesqueeze2.3.2-3+squeeze2high

Notes

[lenny] - linux-2.6 <no-dsa> (attacker needs elevated CAP_SYS_ADMIN privileges to abuse this)
[squeeze] - linux-2.6 <no-dsa> (attacker needs elevated CAP_SYS_ADMIN privileges to abuse this)
this is technically a kernel bug. however this has been workarounded specifically
for vsftpd by adding a kernel check before using this feature, see DSA-2304-1
for details

Search for package or bug name: Reporting problems