Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 16 Feb 2011 16:43:28 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
Subject: kernel: ALSA: caiaq - Fix possible string-buffer overflow

Reported by rafa@...infosecurity.com, "Use strlcpy() to assure not to 
overflow the string array sizes by too long USB device name string."

http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commitdiff;h=eaae55dac6b64c0616046436b294e69fc5311581

Just FYI, I'm not requesting a CVE name for this as it only affects 
Native Instruments USB audio devices with very long device name which I 
think is unlikely.

https://bugzilla.redhat.com/show_bug.cgi?id=677881

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.