Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 24 Jun 2011 13:30:48 +1000
From: Murray McAllister <>
CC: Eugene Teo <>,
        "Steven M. Christey" <>
Subject: Re: CVE request: kernel: bluetooth: l2cap and rfcomm:
 fix 1 byte infoleak to userspace

On 06/24/2011 01:25 PM, Eugene Teo wrote:
>  From Marek Kroemeke and Filip Palian, structures "l2cap_conninfo" and
> "rfcomm_conninfo" have one padding byte each. This byte in "cinfo" is
> copied to userspace uninitialized.
> l2cap: since 99f4808d (v2.6.39-rc1), also in l2cap.c prior to that
> history:e9df2323 (v2.5.14)
> rfcomm: since history:9363d05d (v2.6.11-rc2)
> Thanks, Eugene
Please use CVE-2011-2492.


Murray McAllister / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ