Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 14 Sep 2011 12:43:32 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: CVE request -- kernel: b43: allocate receive buffers big enough for
 max frame len + offset

"A flaw has been found in a way b43 driver processed incoming frames. An
attacker able to send frames to the systems with Broadcom 43xx series
wireless devices could use this flaw to crash those systems."

Upstream patch:
c85ce65ecac078ab1a1835c87c4a6319cf74660a

References:
https://bugzilla.redhat.com/show_bug.cgi?id=738202
https://bugzilla.kernel.org/show_bug.cgi?id=32042
https://github.com/mirrors/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.