CVE-2009-4538

N/A Unknown
Published: January 12, 2010 Modified: April 23, 2026
View on NVD

Description

drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/38031
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38276
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38296
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38492
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38610
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38779
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1023420
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.debian.org/security/2010/dsa-1996
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2010/dsa-2005
Source: cve@mitre.org
Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/12/28/1
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/12/29/2
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/12/31/1
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0019.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0020.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0041.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0053.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0111.html
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/37523
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=551214
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/55645
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: cve@mitre.org
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/38031
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38276
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38296
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38492
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38610
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38779
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1023420
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.debian.org/security/2010/dsa-1996
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2010/dsa-2005
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:066
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/12/28/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/12/29/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/12/31/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0041.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0053.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0111.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/37523
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=551214
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/55645
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7016
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9702
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

60 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
5.5%
90th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

debian linux