Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 11 Oct 2011 21:23:11 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org, Peter.Huewe@...ineon.com, srajiv@...ux.vnet.ibm.com,
        eteo@...hat.com
Subject: Please REJECT CVE-2011-1161

Patch for this CVE in its original form tried to limit TPM_PARAMSIZE to
the userspace buffer size. While this is still an unsolved problem
(because of the patch changes), with patches for CVE-2011-1160 and
CVE-2011-1162 applied this is a security hardening not a security flaw.
Please reject this as a dupe of CVE-2011-1160 and/or CVE-2011-1162.

References: 
https://github.com/torvalds/linux/commit/6b07d30a
https://bugzilla.redhat.com/show_bug.cgi?id=732629#c13
http://sourceforge.net/mailarchive/forum.php?thread_name=CAGyNYUPLbujZm0hq9rfBgXk-xw_xm1ofhe59yNkqEupdt5fUrg%40mail.gmail.com&forum_name=tpmdd-devel

Thank you,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.