VYPR
High severity7.5NVD Advisory· Published Jun 8, 2013· Updated Apr 29, 2026

CVE-2011-4087

CVE-2011-4087

Description

The br_parse_ip_options function in net/bridge/br_netfilter.c in the Linux kernel before 2.6.39 does not properly initialize a certain data structure, which allows remote attackers to cause a denial of service by leveraging connectivity to a network interface that uses an Ethernet bridge device.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: <2.6.39

Patches

1
f8e9881c2aef

bridge: reset IPCB in br_parse_ip_options

https://github.com/torvalds/linuxEric DumazetApr 12, 2011via nvd-ref
1 file changed · +2 4
  • net/bridge/br_netfilter.c+2 4 modified
    @@ -249,11 +249,9 @@ static int br_parse_ip_options(struct sk_buff *skb)
     		goto drop;
     	}
     
    -	/* Zero out the CB buffer if no options present */
    -	if (iph->ihl == 5) {
    -		memset(IPCB(skb), 0, sizeof(struct inet_skb_parm));
    +	memset(IPCB(skb), 0, sizeof(struct inet_skb_parm));
    +	if (iph->ihl == 5)
     		return 0;
    -	}
     
     	opt->optlen = iph->ihl*4 - sizeof(struct iphdr);
     	if (ip_options_compile(dev_net(dev), opt, skb))
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.