Summary: | Kernel: e1000 trailing payload data (CVE-2009-{4536,4538}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hardened-kernel+disabled, kernel |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=40a14deaf411592b57cb0720f0e8004293ab9865 | ||
Whiteboard: | [linux <2.6.33] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
2010-02-06 15:34:10 UTC
CVE-2009-4538 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4538): drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537. http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=40a14deaf411592b57cb0720f0e8004293ab9865 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9926146b15fd96d78a4f7c32e7a26d50639369f4 Maybe I missed a commit, but those mentioned above have been definitely fixed during 2.6.32-rc6. ...fixed during 2.6.33-rc6. (As far as I can tell, 2.6.32.7 is still affected) |