** Changed in: linux-ec2 (Ubuntu Lucid)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Oneiric)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
       Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
       Status: New => Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
       Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
       Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
       Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
       Status: New => Invalid

** Description changed:

  The bond_select_queue function in drivers/net/bonding/bond_main.c in the
  Linux kernel before 2.6.39, when a network device with a large number of
  receive queues is installed but the default tx_queues setting is used,
  does not properly restrict queue indexes, which allows remote attackers
  to cause a denial of service (BUG and system crash) or possibly have
  unspecified other impact by sending network traffic.
  
- Fixed-by: fd0e435b0fe85622f167b84432552885a4856ac8
+ Break-Fix: - fd0e435b0fe85622f167b84432552885a4856ac8

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/792312

Title:
  CVE-2011-1581

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/792312/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to