CVE-2018-1000026
Summary
| CVE | CVE-2018-1000026 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-02-09 23:29:00 UTC |
| Updated | 2023-10-03 15:39:00 UTC |
| Description | Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM.. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| USN-3619-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| [v2] bnx2x: disable GSO where gso_size is too big for hardware - Patchwork |
MISC |
patchwork.ozlabs.org |
Third Party Advisory |
| USN-3617-2: Linux (HWE) vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3619-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3617-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| [SECURITY] [DLA 1771-1] linux-4.9 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| netdev - Re: [PATCH 0/3] Check gso_size of packets when forwarding |
MLIST |
lists.openwall.net |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| USN-3620-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| netdev - [PATCH 0/3] Check gso_size of packets when forwarding |
MLIST |
lists.openwall.net |
Third Party Advisory |
| USN-3617-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3620-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3632-1: Linux kernel (Azure) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159453 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9534)
- 390250 Oracle Managed Virtualization (VM) Server for x86 Security Update for kernel (OVMSA-2021-0036)
- 900101 CBL-Mariner Linux Security Update for kernel 5.10.52.1
- 900303 CBL-Mariner Linux Security Update for kernel 5.10.57.1
- 900321 CBL-Mariner Linux Security Update for kernel 5.10.60.1
- 901123 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6517-1)
- 903012 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3490)
- 906004 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3490-1)
- 906390 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6517-2)