Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 20 Nov 2008 21:18:42 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: Eugene Teo <eugeneteo@...nel.sg>
cc: oss-security@...ts.openwall.com, coley@...re.org
Subject: Re: CVE request: kernel: libertas: fix buffer overrun



======================================================
Name: CVE-2008-5134
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5134
Reference: MLIST:[linux-wireless] 20081029 [PATCH] libertas: fix buffer overrun
Reference: URL:http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
Reference: MLIST:[oss-security] 20081111 CVE request: kernel: libertas: fix buffer overrun
Reference: URL:http://openwall.com/lists/oss-security/2008/11/11/2
Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=48735d8d8bd701b1e0cd3d49c21e5e385ddcb077
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=470761

Buffer overflow in the lbs_process_bss function in
drivers/net/wireless/libertas/scan.c in the libertas subsystem in the
Linux kernel before 2.6.27.5 allows remote attackers to have an
unknown impact via an "invalid beacon/probe response."


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.