drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux
kernel 188.8.131.52 and earlier handles Ethernet frames that exceed the
MTU by processing certain trailing payload data as if it were a
complete frame, which allows remote attackers to bypass packet
filters via a large packet with a crafted payload. NOTE: this
vulnerability exists because of an incorrect fix for CVE-2009-1385.
drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel
184.108.40.206 and earlier does not properly check the size of an Ethernet
frame that exceeds the MTU, which allows remote attackers to have an
unspecified impact via crafted packets, a related issue to
Maybe I missed a commit, but those mentioned above have been definitely fixed during 2.6.32-rc6.
...fixed during 2.6.33-rc6. (As far as I can tell, 220.127.116.11 is still affected)