oss-sec mailing list archives
Re: CVE request for prima wlan driver: Address buffer overflow due to invalid length
From: Nico Golde <oss-security+ml () ngolde de>
Date: Sun, 24 Jan 2016 20:55:48 +0100
Hi, * Shawn <citypw () gmail com> [2016-01-24 13:05]:
**Introduction*** One exploitable bug has been fixed in prima wlan driver a few months ago. Upstream fix: https://github.com/sonyxperiadev/prima/commit/4b91219ada9e73c897da2e0ae7bf2ff043dde950
[...] This already has a CVE id per: https://codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015 This is CVE-2015-0569. Cheers, Nico -- Nico Golde - XMPP: nion () jabber ccc de - GPG: 0xA0A0AAAA
Attachment:
_bin
Description:
Current thread:
- CVE request for prima wlan driver: Address buffer overflow due to invalid length Shawn (Jan 23)
- Re: CVE request for prima wlan driver: Address buffer overflow due to invalid length Nico Golde (Jan 24)