oss-sec mailing list archives

Re: CVE request: kernel: libertas: fix buffer overrun


From: "Steven M. Christey" <coley () linus mitre org>
Date: Thu, 20 Nov 2008 21:18:42 -0500 (EST)



======================================================
Name: CVE-2008-5134
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5134
Reference: MLIST:[linux-wireless] 20081029 [PATCH] libertas: fix buffer overrun
Reference: URL:http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
Reference: MLIST:[oss-security] 20081111 CVE request: kernel: libertas: fix buffer overrun
Reference: URL:http://openwall.com/lists/oss-security/2008/11/11/2
Reference: 
CONFIRM:http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=48735d8d8bd701b1e0cd3d49c21e5e385ddcb077
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=470761

Buffer overflow in the lbs_process_bss function in
drivers/net/wireless/libertas/scan.c in the libertas subsystem in the
Linux kernel before 2.6.27.5 allows remote attackers to have an
unknown impact via an "invalid beacon/probe response."



Current thread: