Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 14 Nov 2013 23:03:34 +0100
From: "Mathy Vanhoef" <>
To: <>
Subject: CVE request: ath9k_htc improperly updates MAC address



This concerns a bug in the ath9k_htc driver: When a user changes/spoofs
their MAC address, an attacker can retrieve the original MAC address, which
is a potential privacy risk. Debian bug report:


Background of the bug:


The cause of the bug is in ath9k_htc_set_bssid_mask [1]. Here the MAC
address of one of the virtual interfaces should be picked as the new main
MAC address of the device. However the main MAC address (stored in
common->macaddr) is never updated. The ath9k does implement this properly
and sets the main MAC address to the MAC address of one of the virtual
interfaces (by first writing it to iter_data->hw_macaddr and then copying it
over to common->macaddr [2]). Note that ath_hw_setbssidmask updates the main
MAC address register for both the ath9k and ath9k_htc drivers [3].


Can a CVE please be assigned?










Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.