CVE-2009-1385
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
04/06/2009
Last modified:
09/04/2025
Description
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:intel:e1000:*:*:*:*:*:*:*:* | 7.4.35 (including) | |
| cpe:2.3:a:intel:e1000:5.2.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.2.30.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.2.52:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.3.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.4.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.6.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.6.10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:5.7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:6.0.54:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:6.0.60:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:6.1.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:6.2.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:e1000:6.3.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Dea30e11970a96cfe5e32c03a29332554573b4a10
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
- http://osvdb.org/54892
- http://secunia.com/advisories/35265
- http://secunia.com/advisories/35566
- http://secunia.com/advisories/35623
- http://secunia.com/advisories/35656
- http://secunia.com/advisories/35847
- http://secunia.com/advisories/36051
- http://secunia.com/advisories/36131
- http://secunia.com/advisories/36327
- http://secunia.com/advisories/37471
- http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302
- http://wiki.rpath.com/Advisories:rPSA-2009-0111
- http://www.debian.org/security/2009/dsa-1844
- http://www.debian.org/security/2009/dsa-1865
- http://www.intel.com/support/network/sb/CS-030543.htm
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A135
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A148
- http://www.openwall.com/lists/oss-security/2009/06/03/2
- http://www.redhat.com/support/errata/RHSA-2009-1157.html
- http://www.redhat.com/support/errata/RHSA-2009-1193.html
- http://www.securityfocus.com/archive/1/505254/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/archive/1/512019/100/0/threaded
- http://www.securityfocus.com/bid/35185
- http://www.ubuntu.com/usn/usn-793-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
- https://bugzilla.redhat.com/show_bug.cgi?id=502981
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
- https://rhn.redhat.com/errata/RHSA-2009-1550.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Dea30e11970a96cfe5e32c03a29332554573b4a10
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
- http://osvdb.org/54892
- http://secunia.com/advisories/35265
- http://secunia.com/advisories/35566
- http://secunia.com/advisories/35623
- http://secunia.com/advisories/35656
- http://secunia.com/advisories/35847
- http://secunia.com/advisories/36051
- http://secunia.com/advisories/36131
- http://secunia.com/advisories/36327
- http://secunia.com/advisories/37471
- http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302
- http://wiki.rpath.com/Advisories:rPSA-2009-0111
- http://www.debian.org/security/2009/dsa-1844
- http://www.debian.org/security/2009/dsa-1865
- http://www.intel.com/support/network/sb/CS-030543.htm
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A135
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A148
- http://www.openwall.com/lists/oss-security/2009/06/03/2
- http://www.redhat.com/support/errata/RHSA-2009-1157.html
- http://www.redhat.com/support/errata/RHSA-2009-1193.html
- http://www.securityfocus.com/archive/1/505254/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/archive/1/512019/100/0/threaded
- http://www.securityfocus.com/bid/35185
- http://www.ubuntu.com/usn/usn-793-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
- https://bugzilla.redhat.com/show_bug.cgi?id=502981
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
- https://rhn.redhat.com/errata/RHSA-2009-1550.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html



