[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: kernel: libertas: fix buffer overrun
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-11-21 2:18:42
Message-ID: Pine.GSO.4.51.0811202118290.20524 () faron ! mitre ! org
[Download RAW message or body]



======================================================
Name: CVE-2008-5134
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5134
Reference: MLIST:[linux-wireless] 20081029 [PATCH] libertas: fix buffer overrun
Reference: URL:http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
Reference: MLIST:[oss-security] 20081111 CVE request: kernel: libertas: fix buffer overrun
Reference: URL:http://openwall.com/lists/oss-security/2008/11/11/2
Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=48735d8d8bd701b1e0cd3d49c21e5e385ddcb077
                
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=470761

Buffer overflow in the lbs_process_bss function in
drivers/net/wireless/libertas/scan.c in the libertas subsystem in the
Linux kernel before 2.6.27.5 allows remote attackers to have an
unknown impact via an "invalid beacon/probe response."


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic