Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 28 Dec 2009 15:47:01 +0800
From: Eugene Teo <>
CC: "Steven M. Christey" <>
Subject: CVE requests - kernel security regressions for CVE-2009-1385/and

In Fabian's talk, he describes two kernel NIC driver issues:

Issue #1
Fabian claimed that CVE-2009-1385 has an incorrect fix:

Which fixes a DoS when the frame spans multiple buffers and the last 
buffer contains less than four bytes. However, if that last fragment is 
longer than 4 bytes, it will actually be taken into account while the 
previous fragments will have been ignored.

Issue #2
The fix for CVE-2009-1389 regarding the r8169 driver introduces a 
similar security problem as this: is 
a revert of this:

The accompanying comment for the original commit (126fa):

The size of the incoming frame is not correctly checked.

The RxMaxSize register (0xDA) does not work as expected and incoming 
frames whose size exceeds the MTU actually end spanning multiple 
descriptors. The first Rx descriptor contains the size of the whole 
frame (or some garbage in its place). The driver does not expect 
something above the space allocated to the current skb and crashes 
loudly when it issues a skb_put.

The fix contains two parts:
- disable hardware Rx size filtering: so far it only proved to be able
to trigger some new fancy errors;

There are other issues he mentioned during his talk, regarding squid and 
pidgin. You can read about it at this wonderful blog:

Thanks, Eugene
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ