Your message dated Mon, 27 Jul 2009 01:00:06 +0200
with message-id <[email protected]>
and subject line fixed
has caused the Debian Bug report #532721,
regarding linux-2.6: CVE-2009-1385 dos in e1000 driver
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
532721: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532721
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: linux-2.6
Severity: important
Version: 2.6.18.dfsg.1-24 (and newer)
Tags: security , patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for linux-2.6.

CVE-2009-1385[0]:
| Integer underflow in the e1000_clean_rx_irq function in
| drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel
| before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel
| Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to
| cause a denial of service (panic) via a crafted frame size.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Patches available [1].

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385
    http://security-tracker.debian.net/tracker/CVE-2009-1385
[1] 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea30e11970a96cfe5e32c03a29332554573b4a10



--- End Message ---
--- Begin Message ---
Version: 2.6.30-1



--- End Message ---

Reply via email to