drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 2.6.32.3 (including) |
MRG for RHEL-5 | RedHat | kernel-rt-0:2.6.24.7-146.el5rt | * |
Red Hat Enterprise Linux 3 Extended Lifecycle Support | RedHat | kernel-0:2.4.21-66.EL | * |
Red Hat Enterprise Linux 4 | RedHat | kernel-0:2.6.9-89.0.19.EL | * |
Red Hat Enterprise Linux 4.7 Z Stream | RedHat | kernel-0:2.6.9-78.0.29.EL | * |
Red Hat Enterprise Linux 5 | RedHat | kernel-0:2.6.18-164.10.1.el5 | * |
Red Hat Enterprise Linux 5.2 Z Stream | RedHat | kernel-0:2.6.18-92.1.35.el5 | * |
Red Hat Enterprise Linux 5.3.Z - Server Only | RedHat | kernel-0:2.6.18-128.12.1.el5 | * |
Red Hat Enterprise Virtualization for RHEL-5 | RedHat | rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1 | * |
Linux | Ubuntu | hardy | * |
Linux | Ubuntu | intrepid | * |
Linux | Ubuntu | jaunty | * |
Linux | Ubuntu | karmic | * |
Linux-source-2.6.15 | Ubuntu | dapper | * |