CVE-2009-1385

Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
http://osvdb.org/54892
http://secunia.com/advisories/35265 Vendor Advisory
http://secunia.com/advisories/35566
http://secunia.com/advisories/35623
http://secunia.com/advisories/35656
http://secunia.com/advisories/35847
http://secunia.com/advisories/36051
http://secunia.com/advisories/36131
http://secunia.com/advisories/36327
http://secunia.com/advisories/37471
http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302 Patch
http://wiki.rpath.com/Advisories:rPSA-2009-0111
http://www.debian.org/security/2009/dsa-1844
http://www.debian.org/security/2009/dsa-1865
http://www.intel.com/support/network/sb/CS-030543.htm
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
http://www.openwall.com/lists/oss-security/2009/06/03/2
http://www.redhat.com/support/errata/RHSA-2009-1157.html
http://www.redhat.com/support/errata/RHSA-2009-1193.html
http://www.securityfocus.com/archive/1/505254/100/0/threaded
http://www.securityfocus.com/archive/1/507985/100/0/threaded
http://www.securityfocus.com/archive/1/512019/100/0/threaded
http://www.securityfocus.com/bid/35185
http://www.ubuntu.com/usn/usn-793-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/3316
https://bugzilla.redhat.com/show_bug.cgi?id=502981 Exploit Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
https://rhn.redhat.com/errata/RHSA-2009-1550.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
http://osvdb.org/54892
http://secunia.com/advisories/35265 Vendor Advisory
http://secunia.com/advisories/35566
http://secunia.com/advisories/35623
http://secunia.com/advisories/35656
http://secunia.com/advisories/35847
http://secunia.com/advisories/36051
http://secunia.com/advisories/36131
http://secunia.com/advisories/36327
http://secunia.com/advisories/37471
http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302 Patch
http://wiki.rpath.com/Advisories:rPSA-2009-0111
http://www.debian.org/security/2009/dsa-1844
http://www.debian.org/security/2009/dsa-1865
http://www.intel.com/support/network/sb/CS-030543.htm
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
http://www.openwall.com/lists/oss-security/2009/06/03/2
http://www.redhat.com/support/errata/RHSA-2009-1157.html
http://www.redhat.com/support/errata/RHSA-2009-1193.html
http://www.securityfocus.com/archive/1/505254/100/0/threaded
http://www.securityfocus.com/archive/1/507985/100/0/threaded
http://www.securityfocus.com/archive/1/512019/100/0/threaded
http://www.securityfocus.com/bid/35185
http://www.ubuntu.com/usn/usn-793-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/3316
https://bugzilla.redhat.com/show_bug.cgi?id=502981 Exploit Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
https://rhn.redhat.com/errata/RHSA-2009-1550.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:intel:e1000:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.2.22:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.2.30.1:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.2.52:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.3.19:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.4.11:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.6.10:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.6.10.1:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:5.7.6:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:6.0.54:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:6.0.60:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:6.1.16:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:6.2.15:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:6.3.9:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.0.33:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.0.41:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.1.9:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.2.7:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.2.9:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.3.15:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.3.20:*:*:*:*:*:*:*
cpe:2.3:a:intel:e1000:7.4.27:*:*:*:*:*:*:*
cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*
cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:rc7-git6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10 -
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html -
References () http://osvdb.org/54892 - () http://osvdb.org/54892 -
References () http://secunia.com/advisories/35265 - Vendor Advisory () http://secunia.com/advisories/35265 - Vendor Advisory
References () http://secunia.com/advisories/35566 - () http://secunia.com/advisories/35566 -
References () http://secunia.com/advisories/35623 - () http://secunia.com/advisories/35623 -
References () http://secunia.com/advisories/35656 - () http://secunia.com/advisories/35656 -
References () http://secunia.com/advisories/35847 - () http://secunia.com/advisories/35847 -
References () http://secunia.com/advisories/36051 - () http://secunia.com/advisories/36051 -
References () http://secunia.com/advisories/36131 - () http://secunia.com/advisories/36131 -
References () http://secunia.com/advisories/36327 - () http://secunia.com/advisories/36327 -
References () http://secunia.com/advisories/37471 - () http://secunia.com/advisories/37471 -
References () http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302 - Patch () http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302 - Patch
References () http://wiki.rpath.com/Advisories:rPSA-2009-0111 - () http://wiki.rpath.com/Advisories:rPSA-2009-0111 -
References () http://www.debian.org/security/2009/dsa-1844 - () http://www.debian.org/security/2009/dsa-1844 -
References () http://www.debian.org/security/2009/dsa-1865 - () http://www.debian.org/security/2009/dsa-1865 -
References () http://www.intel.com/support/network/sb/CS-030543.htm - () http://www.intel.com/support/network/sb/CS-030543.htm -
References () http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8 - Patch, Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8 - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 -
References () http://www.openwall.com/lists/oss-security/2009/06/03/2 - () http://www.openwall.com/lists/oss-security/2009/06/03/2 -
References () http://www.redhat.com/support/errata/RHSA-2009-1157.html - () http://www.redhat.com/support/errata/RHSA-2009-1157.html -
References () http://www.redhat.com/support/errata/RHSA-2009-1193.html - () http://www.redhat.com/support/errata/RHSA-2009-1193.html -
References () http://www.securityfocus.com/archive/1/505254/100/0/threaded - () http://www.securityfocus.com/archive/1/505254/100/0/threaded -
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - () http://www.securityfocus.com/archive/1/507985/100/0/threaded -
References () http://www.securityfocus.com/archive/1/512019/100/0/threaded - () http://www.securityfocus.com/archive/1/512019/100/0/threaded -
References () http://www.securityfocus.com/bid/35185 - () http://www.securityfocus.com/bid/35185 -
References () http://www.ubuntu.com/usn/usn-793-1 - () http://www.ubuntu.com/usn/usn-793-1 -
References () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - () http://www.vmware.com/security/advisories/VMSA-2009-0016.html -
References () http://www.vupen.com/english/advisories/2009/3316 - () http://www.vupen.com/english/advisories/2009/3316 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=502981 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=502981 - Exploit, Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340 -
References () https://rhn.redhat.com/errata/RHSA-2009-1550.html - () https://rhn.redhat.com/errata/RHSA-2009-1550.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html -

Information

Published : 2009-06-04 16:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1385

Mitre link : CVE-2009-1385

CVE.ORG link : CVE-2009-1385


JSON object : View

Products Affected

intel

  • e1000

linux

  • linux_kernel
  • kernel
CWE
CWE-189

Numeric Errors