Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 12 Feb 2013 11:42:57 -0500 (EST)
From: cve-assign@...re.org
To: fw@...eb.enyo.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: e1000e/82574L hardware erratum

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>It's been reported that some Intel 82574L network controllers can be
>brought into a non-processing state by receiving certain Ethernet
>frames:
>
><http://blog.krisk.org/2013/02/packets-of-death.html>
>
>The packet is not malformed at the lower layers and will travel over
>the Internet.

Use CVE-2013-1634.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJRGm//AAoJEGvefgSNfHMd5TEH/18N0E7vtVxa/yDlXY4rrSio
PQsemVLwSdDGaDIB1fPczBHJub+qT7IN9Rz7gK2MFMe+t6m5aWSp+B1ZfU5q+vVd
eHbRZ9ZlKLixoGlfWxwU9T7C42U7EWWgoPf/cxlqD5/U1TlOa6f+lL9G152s0ZWu
wXoQl4uIn6yICRcs4Paws92oYfLhFoqlPc8W6OL5KKAtBDxExmPpaKmPkWNKaiom
lS53JE4o5uUNDPNNtWjnS1QI1QzbOZXQPCIyrnRh7QXLxTB/b4RW7LEMYYRV/n1Y
RCRdFzWOpBIsLliGUqaBjyW0hMzZkYxtY1hOemQjBzP87riGg/aKGDPOQy1B4oA=
=XTPE
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.