Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 24 Jun 2011 11:25:59 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak
 to userspace

>From Marek Kroemeke and Filip Palian, structures "l2cap_conninfo" and
"rfcomm_conninfo" have one padding byte each. This byte in "cinfo" is
copied to userspace uninitialized.

l2cap: since 99f4808d (v2.6.39-rc1), also in l2cap.c prior to that
history:e9df2323 (v2.5.14)
rfcomm: since history:9363d05d (v2.6.11-rc2)

http://git.kernel.org/linus/8d03e971cf403305217b8e62db3a2e5ad2d6263f
https://bugzilla.redhat.com/show_bug.cgi?id=703019

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.