Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 6 Dec 2010 16:17:07 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: igb panics when receiving
 tag vlan packet

Please use CVE-2010-4263

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> If igb's SR-IOV and promiscuous mode are enabled and the interface 
> receives a tag VLAN packet, this will result in a null pointer 
> dereference. To fix this, we will backport upstream commit 31b24b95 to
> 
> ensure that vlan_gro_receive is only used if vlans have been
> registered 
> to the adapter structure.
> 
> Reference:
> https://bugzilla.redhat.com/show_bug.cgi?id=660188
> https://bugzilla.kernel.org/show_bug.cgi?id=15582
> 
> Upstream commit:
> http://git.kernel.org/linus/31b24b95
> 
> Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.