Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 24 Jun 2011 13:30:48 +1000
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
CC: Eugene Teo <eugene@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: bluetooth: l2cap and rfcomm:
 fix 1 byte infoleak to userspace

On 06/24/2011 01:25 PM, Eugene Teo wrote:
>  From Marek Kroemeke and Filip Palian, structures "l2cap_conninfo" and
> "rfcomm_conninfo" have one padding byte each. This byte in "cinfo" is
> copied to userspace uninitialized.
>
> l2cap: since 99f4808d (v2.6.39-rc1), also in l2cap.c prior to that
> history:e9df2323 (v2.5.14)
> rfcomm: since history:9363d05d (v2.6.11-rc2)
>
> http://git.kernel.org/linus/8d03e971cf403305217b8e62db3a2e5ad2d6263f
> https://bugzilla.redhat.com/show_bug.cgi?id=703019
>
> Thanks, Eugene
Please use CVE-2011-2492.

Thanks.

-- 
Murray McAllister / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.