The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=696029 | Issue Tracking Third Party Advisory |
http://securitytracker.com/id?1025558 | Third Party Advisory VDB Entry |
http://openwall.com/lists/oss-security/2011/04/13/4 | Mailing List Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/13/16 | Mailing List Patch Third Party Advisory |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 | Release Notes Vendor Advisory |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd0e435b0fe85622f167b84432552885a4856ac8 |
Configurations
Information
Published : 2011-05-26 09:55
Updated : 2023-02-12 20:29
NVD link : CVE-2011-1581
Mitre link : CVE-2011-1581
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
linux
- linux_kernel