diff options
author | Jesse Brandeburg <jesse.brandeburg@intel.com> | 2010-01-19 17:15:59 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2010-01-21 03:21:23 +0300 |
commit | b94b50289622e816adc9f94111cfc2679c80177c (patch) | |
tree | 9545a229c7ef2dbdcdc8300fd4d84ff3cafc7808 /include/linux/keyctl.h | |
parent | 40a14deaf411592b57cb0720f0e8004293ab9865 (diff) | |
download | linux-b94b50289622e816adc9f94111cfc2679c80177c.tar.xz |
e1000e: enhance frame fragment detection
Originally patched by Neil Horman <nhorman@tuxdriver.com>
e1000e could with a jumbo frame enabled interface, and packet split disabled,
receive a packet that would overflow a single rx buffer. While in practice
very hard to craft a packet that could abuse this, it is possible.
this is related to CVE-2009-4538
Signed-off-by: Jesse Brandeburg <jesse.brandeburg@intel.com>
CC: Neil Horman <nhorman@tuxdriver.com>
Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/linux/keyctl.h')
0 files changed, 0 insertions, 0 deletions