CVE-2011-1581

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fd0e435b0fe85622f167b84432552885a4856ac8

http://openwall.com/lists/oss-security/2011/04/13/16

http://openwall.com/lists/oss-security/2011/04/13/4

http://securitytracker.com/id?1025558

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39

https://bugzilla.redhat.com/show_bug.cgi?id=696029

Details

Source: MITRE

Published: 2011-05-26

Updated: 2020-07-29

Type: CWE-20

Risk Information

CVSS v2

Base Score: 9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C

Impact Score: 8.5

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
75879openSUSE Security Update : kernel (openSUSE-SU-2011:0416-1)NessusSuSE Local Security Checks
high
61041Scientific Linux Security Update : kernel on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
medium
56768Ubuntu 10.04 LTS : linux-lts-backport-natty vulnerabilities (USN-1256-1)NessusUbuntu Local Security Checks
critical
56257USN-1212-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
high
55923Ubuntu 11.04 : linux vulnerabilities (USN-1193-1)NessusUbuntu Local Security Checks
high
54590RHEL 6 : kernel (RHSA-2011:0542)NessusRed Hat Local Security Checks
high