Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4CFC4B77.6000600@redhat.com>
Date: Mon, 06 Dec 2010 10:33:27 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: igb panics when receiving tag vlan packet

If igb's SR-IOV and promiscuous mode are enabled and the interface 
receives a tag VLAN packet, this will result in a null pointer 
dereference. To fix this, we will backport upstream commit 31b24b95 to 
ensure that vlan_gro_receive is only used if vlans have been registered 
to the adapter structure.

Reference:
https://bugzilla.redhat.com/show_bug.cgi?id=660188
https://bugzilla.kernel.org/show_bug.cgi?id=15582

Upstream commit:
http://git.kernel.org/linus/31b24b95

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.