Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 24 Jun 2011 13:30:48 +1000
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
CC: Eugene Teo <eugene@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: bluetooth: l2cap and rfcomm:
 fix 1 byte infoleak to userspace

On 06/24/2011 01:25 PM, Eugene Teo wrote:
>  From Marek Kroemeke and Filip Palian, structures "l2cap_conninfo" and
> "rfcomm_conninfo" have one padding byte each. This byte in "cinfo" is
> copied to userspace uninitialized.
>
> l2cap: since 99f4808d (v2.6.39-rc1), also in l2cap.c prior to that
> history:e9df2323 (v2.5.14)
> rfcomm: since history:9363d05d (v2.6.11-rc2)
>
> http://git.kernel.org/linus/8d03e971cf403305217b8e62db3a2e5ad2d6263f
> https://bugzilla.redhat.com/show_bug.cgi?id=703019
>
> Thanks, Eugene
Please use CVE-2011-2492.

Thanks.

-- 
Murray McAllister / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ