Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1581

Опубликовано: 14 мар. 2011
Источник: redhat
CVSS2: 4.6
EPSS Низкий

Описание

The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.

Отчет

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG as they did not backport the upstream commit bb1d9123 that introduced this issue. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4kernelNot affected
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise MRG 1realtime-kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:054219.05.2011

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=696029kernel: bonding: Incorrect TX queue offset

EPSS

Процентиль: 77%
0.01072
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.

nvd
около 14 лет назад

The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.

debian
около 14 лет назад

The bond_select_queue function in drivers/net/bonding/bond_main.c in t ...

github
около 3 лет назад

The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.

oracle-oval
около 14 лет назад

ELSA-2011-0542: Oracle Linux 6.1 kernel security, bug fix and enhancement update (IMPORTANT)

EPSS

Процентиль: 77%
0.01072
Низкий

4.6 Medium

CVSS2