Description
The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-1582 | The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic. |
Ubuntu USN |
USN-1193-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1212-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1256-1 | Linux kernel (Natty backport) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:28:41.919Z
Reserved: 2011-04-05T00:00:00.000Z
Link: CVE-2011-1581
No data.
Status : Deferred
Published: 2011-05-26T16:55:04.817
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-1581
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN