CVE-2011-4087

Publication date 29 October 2011

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

The br_parse_ip_options function in net/bridge/br_netfilter.c in the Linux kernel before 2.6.39 does not properly initialize a certain data structure, which allows remote attackers to cause a denial of service by leveraging connectivity to a network interface that uses an Ethernet bridge device.

From the Ubuntu Security Team

Scot Doyle discovered that the bridge networking interface incorrectly handled certain network packets. A remote attacker could exploit this to crash the system, leading to a denial of service.

Read the notes from the security team

Status

Package Ubuntu Release Status
linux 12.10 quantal
Not affected
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
11.04 natty
Fixed 2.6.38-11.47
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected
linux-armadaxp 12.10 quantal
Not affected
12.04 LTS precise
Not affected
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release
linux-ec2 12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Ignored end of life
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-fsl-imx51 12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-lts-backport-maverick 12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-lts-backport-natty 12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid
Fixed 2.6.38-11.49~lucid1
8.04 LTS hardy Not in release
linux-lts-backport-oneiric 12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid
Fixed 3.0.0-5.6~lucid1
8.04 LTS hardy Not in release
linux-mvl-dove 12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-ti-omap4 12.10 quantal
Not affected
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
11.04 natty
Fixed 2.6.38-1209.18
10.10 maverick
Not affected
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release

Notes


tyhicks

Introduced by 462fb2af, 2.6.37


apw

the fix below is actually a simple optimisation and not required: break-fix: 462fb2af9788a82a534f8184abfde31574e1cfa0 10949550bd1e50cc91c0f5085f7080a44b0871fe

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
linux

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-1294-1
    • Linux kernel (Oneiric backport) vulnerabilities
    • 8 December 2011
    • USN-1304-1
    • Linux kernel (OMAP4) vulnerabilities
    • 13 December 2011
    • USN-1256-1
    • Linux kernel (Natty backport) vulnerabilities
    • 9 November 2011
    • USN-1193-1
    • Linux kernel vulnerabilities
    • 19 August 2011

Other references