oss-sec mailing list archives

Re: CVE request: Linux kernel: Bluetooth HIDP information disclosure


From: Kurt Seifried <kseifried () redhat com>
Date: Fri, 22 Feb 2013 22:46:37 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/22/2013 03:05 AM, P J P wrote:
Hello,

Linux kernel built with Bluetooth stack and HIDP support
HCONFIG_BT=y/m & CONFIG_BT_HIDP=y/m is vulnerable to an information
disclosure flaw caused by wrongly initializing the
hid_device->name, physical location and unique identifier
variables. Information leakage happens if these variables are not
NULL('\0') terminated.

An unprivileged user/program could cause this via
ioctl(HIDPCONNADD) call.

Upstream fix: ->
https://git.kernel.org/linus/0a9ab9bdb3e891762553f667066190c1d22ad62b

 Reference: -> https://bugzilla.redhat.com/show_bug.cgi?id=914298

Thank you. -- Prasad J Pandit / Red Hat Security Response Team DB7A
84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Please use CVE-2013-0349 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIbBAEBAgAGBQJRKFe9AAoJEBYNRVNeJnmTHnQP+OmTd2WoXZD596XCnJxDWHsw
3Ow2krRQfQOondYjToxEDEjkRBVNVo/xHN2ENwagOVG0slxoG6D+iuXyABTaesAc
k8EEuMtM4uDr6degu0ka+28z4yDDkPmo9+OTkCeT6fDdTzFeSC2fUv7EoahsgphR
qmW1sedRKqHWCk51wrDMlGJ8F7pAvWVAv25/1sGoXRctudBdHh2OserNkWXujzIR
bojUGIfyxmsa7ItWiBVYSTkWP8Me2QtjHtyxGWJZRXnPSefagJqpgvwf+n8+Xtit
gyI1ZQMMv4+ebpson1W280Rd6qPeUpxMv8wWvIJnuJoleOYASiPh8f7jFmf9eNoy
yhn776nBUjo+NV3pZsh71EwkXI28LUapshnONt7ZJG63cG3cqNmrlN4J2YgrRHfG
qVo5ZS5oC1zfyGqZX2FUuCI0Ee+5s4t5qwAdEzLyOzY+JOFKTt+QWYUF5iHDWv+Z
aYWSkpS4D42byGGKZkWGEQ17jmHLWPlJ8qxMVk1kOVMBpBFPKVAFnvJZK+M4ob/2
HO8bSTDAuDaolUT5hhu3Ttdk/0bl/f+2DUx2HcbBMEM53e5wY8x7Zl3v9u6tl38A
zmwobf6qRnf84cnb7g5JSpkOjHjUDUmeWzhbX4lXCSRHrGSZuWoVdaR9C3SuuF+/
uPTr+zpbKco/8sZGQhk=
=V1ib
-----END PGP SIGNATURE-----


Current thread: