** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Hardy)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Maverick)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Natty)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Natty)
Status: New => Invalid
** Description changed:
The bond_select_queue function in drivers/net/bonding/bond_main.c in the
Linux kernel before 2.6.39, when a network device with a large number of
receive queues is installed but the default tx_queues setting is used,
does not properly restrict queue indexes, which allows remote attackers
to cause a denial of service (BUG and system crash) or possibly have
unspecified other impact by sending network traffic.
- Fixed-by: fd0e435b0fe85622f167b84432552885a4856ac8
+ Break-Fix: - fd0e435b0fe85622f167b84432552885a4856ac8
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/792312
Title:
CVE-2011-1581
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/792312/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs