Bug 127258
Summary: | CAN-2004-0619 Broadcom 5820 integer overflow | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Mark J. Cox <mjc> | ||||||||
Component: | kernel | Assignee: | John W. Linville <linville> | ||||||||
Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> | ||||||||
Severity: | medium | Docs Contact: | |||||||||
Priority: | medium | ||||||||||
Version: | 3.0 | CC: | jgarzik, k.georgiou, peterm, petrides, redhat-bugzilla, riel | ||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
URL: | http://marc.theaimsgroup.com/?l=bugtraq&m=108802653409053 | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||
Doc Text: | Story Points: | --- | |||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2004-12-02 11:35:30 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Attachments: |
|
Description
Mark J. Cox
2004-07-05 11:12:12 UTC
Changing platform to "All" as I don't see anything CPU-specific about this... Created attachment 101977 [details]
bcm5820-security-fix.patch
I think this patch is "obviously correct" for fixing this problem...needs
testing, of course...
No luck so far at tracking-down a card for testing...would be eager to hear of any test results, from anyone so equipped... Created attachment 102247 [details]
bcm5820-fixes.patch
This patch includes previous security patch plus some other "cleanup" fixes...
Created attachment 102263 [details]
bcm5820-better-fixes.patch
Slightly enhance version of previous patch...
A fix for this problem has just been committed to the RHEL3 U4 patch pool this evening (in kernel version 2.4.21-20.3.EL). The fix for this problem has also been committed to the RHEL3 E4 patch pool this evening (in kernel version 2.4.21-20.0.1.EL). |