Bug 127258
| Summary: | CAN-2004-0619 Broadcom 5820 integer overflow | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 3 | Reporter: | Mark J. Cox <mjc> | ||||||||
| Component: | kernel | Assignee: | John W. Linville <linville> | ||||||||
| Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> | ||||||||
| Severity: | medium | Docs Contact: | |||||||||
| Priority: | medium | ||||||||||
| Version: | 3.0 | CC: | jgarzik, k.georgiou, peterm, petrides, redhat-bugzilla, riel | ||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||
| Target Release: | --- | ||||||||||
| Hardware: | All | ||||||||||
| OS: | Linux | ||||||||||
| URL: | http://marc.theaimsgroup.com/?l=bugtraq&m=108802653409053 | ||||||||||
| Whiteboard: | |||||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||||
| Doc Text: | Story Points: | --- | |||||||||
| Clone Of: | Environment: | ||||||||||
| Last Closed: | 2004-12-02 11:35:30 UTC | Type: | --- | ||||||||
| Regression: | --- | Mount Type: | --- | ||||||||
| Documentation: | --- | CRM: | |||||||||
| Verified Versions: | Category: | --- | |||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||
| Embargoed: | |||||||||||
| Attachments: |
|
||||||||||
|
Description
Mark J. Cox
2004-07-05 11:12:12 UTC
Changing platform to "All" as I don't see anything CPU-specific about this... Created attachment 101977 [details]
bcm5820-security-fix.patch
I think this patch is "obviously correct" for fixing this problem...needs
testing, of course...
No luck so far at tracking-down a card for testing...would be eager to hear of any test results, from anyone so equipped... Created attachment 102247 [details]
bcm5820-fixes.patch
This patch includes previous security patch plus some other "cleanup" fixes...
Created attachment 102263 [details]
bcm5820-better-fixes.patch
Slightly enhance version of previous patch...
A fix for this problem has just been committed to the RHEL3 U4 patch pool this evening (in kernel version 2.4.21-20.3.EL). The fix for this problem has also been committed to the RHEL3 E4 patch pool this evening (in kernel version 2.4.21-20.0.1.EL). |