{"id":"CVE-2018-1000026","details":"Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..","modified":"2026-04-16T04:35:24.672382853Z","published":"2018-02-09T23:29:00.823Z","related":["SUSE-SU-2018:0785-1","SUSE-SU-2018:0786-1","SUSE-SU-2018:0986-1","SUSE-SU-2018:2860-1","SUSE-SU-2018:2962-1","SUSE-SU-2018:3029-1"],"references":[{"type":"ADVISORY","url":"http://lists.openwall.net/netdev/2018/01/18/96"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-1/"},{"type":"ADVISORY","url":"http://lists.openwall.net/netdev/2018/01/16/40"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"type":"ADVISORY","url":"https://patchwork.ozlabs.org/patch/859410/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3620-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3632-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-3/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3620-1/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.6.12"},{"fixed":"4.4.181"}]},{"events":[{"introduced":"4.5.0"},{"fixed":"4.9.159"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.102"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.16"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000026.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}]}