High severity7.5NVD Advisory· Published Jun 8, 2013· Updated Apr 29, 2026
CVE-2011-4087
CVE-2011-4087
Description
The br_parse_ip_options function in net/bridge/br_netfilter.c in the Linux kernel before 2.6.39 does not properly initialize a certain data structure, which allows remote attackers to cause a denial of service by leveraging connectivity to a network interface that uses an Ethernet bridge device.
Affected products
1Patches
1f8e9881c2aefbridge: reset IPCB in br_parse_ip_options
1 file changed · +2 −4
net/bridge/br_netfilter.c+2 −4 modified@@ -249,11 +249,9 @@ static int br_parse_ip_options(struct sk_buff *skb) goto drop; } - /* Zero out the CB buffer if no options present */ - if (iph->ihl == 5) { - memset(IPCB(skb), 0, sizeof(struct inet_skb_parm)); + memset(IPCB(skb), 0, sizeof(struct inet_skb_parm)); + if (iph->ihl == 5) return 0; - } opt->optlen = iph->ihl*4 - sizeof(struct iphdr); if (ip_options_compile(dev_net(dev), opt, skb))
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64nvdExploitPatchThird Party Advisory
- ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2011/10/28/14nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.