The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.
References
Link | Resource |
---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd0e435b0fe85622f167b84432552885a4856ac8 | |
http://openwall.com/lists/oss-security/2011/04/13/16 | Mailing List Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/13/4 | Mailing List Patch Third Party Advisory |
http://securitytracker.com/id?1025558 | Third Party Advisory VDB Entry |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 | Release Notes Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=696029 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2011-05-26 16:55
Updated : 2024-02-04 17:54
NVD link : CVE-2011-1581
Mitre link : CVE-2011-1581
CVE.ORG link : CVE-2011-1581
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation