Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 16 Feb 2011 22:29:54 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Josh Bressers <bressers@...hat.com>, coley <coley@...re.org>
Subject: Re: kernel: ALSA: caiaq - Fix possible string-buffer
 overflow

On 02/16/2011 09:48 PM, Josh Bressers wrote:
>
> ----- Original Message -----
>> Reported by rafa@...infosecurity.com, "Use strlcpy() to assure not to
>> overflow the string array sizes by too long USB device name string."
>>
>> http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commitdiff;h=eaae55dac6b64c0616046436b294e69fc5311581
>>
>> Just FYI, I'm not requesting a CVE name for this as it only affects
>> Native Instruments USB audio devices with very long device name which I
>> think is unlikely.
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=677881
>>
>
> I'm assigning this CVE-2011-0712.
>
> With the recent research about having a smartphone impersonate various USB
> devices, I think this attack is now more plausible than in previous years.

Actually this is hardware-specific, and the strcpys are in the 
initialisation part of the code.

Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.