diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2010-05-28 15:36:03 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2010-05-28 15:36:03 +0000 |
commit | be451cdb9081ddb875632258544772539357fc65 (patch) | |
tree | dc6ee286483f181739a660c2b4eb6ad1655d3350 /retired/CVE-2009-4537 | |
parent | 1b81230d695e64ac2ef1ec310895da49d2966e55 (diff) |
retire two issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1842 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2009-4537')
-rw-r--r-- | retired/CVE-2009-4537 | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2009-4537 b/retired/CVE-2009-4537 new file mode 100644 index 00000000..fa025700 --- /dev/null +++ b/retired/CVE-2009-4537 @@ -0,0 +1,17 @@ +Candidate: CVE-2009-4537 +Description: + regression in r8169 driver +References: + http://www.openwall.com/lists/oss-security/2009/12/31/1 + http://marc.info/?t=126202986900002&r=1&w=2 +Notes: + the patch for this issue is partial; in the sense that any deviation from the + default settings opens the hole right back up. Ben Hutchings has volunteered + to work on a comprehensive fix if someone provides him the hardware. see: + http://lkml.org/lkml/2010/3/29/448 +Bugs: +upstream: released (2.6.34-rc3) [c0cd884a] +2.6.32-upstream-stable: released (2.6.32.12) +linux-2.6: released (2.6.32-11) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch] +2.6.26-lenny-security: released (2.6.26-22lenny1) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch, bugfix/all/r8169-offical-fix-for-cve-2009-4537-overlength-frame-dmas.patch] +2.6.32-squeeze-security: released (2.6.32-11) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch] |