Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 22 Feb 2013 22:46:37 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: P J P <ppandit@...hat.com>
Subject: Re: CVE request: Linux kernel: Bluetooth HIDP information
 disclosure

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/22/2013 03:05 AM, P J P wrote:
> Hello,
> 
> Linux kernel built with Bluetooth stack and HIDP support
> HCONFIG_BT=y/m & CONFIG_BT_HIDP=y/m is vulnerable to an information
> disclosure flaw caused by wrongly initializing the
> hid_device->name, physical location and unique identifier
> variables. Information leakage happens if these variables are not
> NULL('\0') terminated.
> 
> An unprivileged user/program could cause this via
> ioctl(HIDPCONNADD) call.
> 
> Upstream fix: ->
> https://git.kernel.org/linus/0a9ab9bdb3e891762553f667066190c1d22ad62b
>
>  Reference: -> https://bugzilla.redhat.com/show_bug.cgi?id=914298
> 
> Thank you. -- Prasad J Pandit / Red Hat Security Response Team DB7A
> 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Please use CVE-2013-0349 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=V1ib
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ