CVE-2011-2189

NameCVE-2011-2189
Descriptionnet/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs629373

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vsftpd (PTS)jessie3.0.2-17+deb8u1fixed
stretch3.0.3-8fixed
buster, bullseye3.0.3-12fixed
bookworm3.0.3-13fixed
sid, trixie3.0.3-13.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linux-2.6source(unstable)2.6.35-1low
vsftpdsourcelenny2.0.7-1+lenny1
vsftpdsourcesqueeze2.3.2-3+squeeze2
vsftpdsource(unstable)2.3.4-1629373

Notes

[lenny] - linux-2.6 <no-dsa> (attacker needs elevated CAP_SYS_ADMIN privileges to abuse this)
[squeeze] - linux-2.6 <no-dsa> (attacker needs elevated CAP_SYS_ADMIN privileges to abuse this)
this is technically a kernel bug. however this has been workarounded specifically
for vsftpd by adding a kernel check before using this feature, see DSA-2304-1
for details

Search for package or bug name: Reporting problems