|
Message-ID: <20110914104332.GB25572@dhcp-25-225.brq.redhat.com> Date: Wed, 14 Sep 2011 12:43:32 +0200 From: Petr Matousek <pmatouse@...hat.com> To: oss-security@...ts.openwall.com Cc: coley@...us.mitre.org Subject: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset "A flaw has been found in a way b43 driver processed incoming frames. An attacker able to send frames to the systems with Broadcom 43xx series wireless devices could use this flaw to crash those systems." Upstream patch: c85ce65ecac078ab1a1835c87c4a6319cf74660a References: https://bugzilla.redhat.com/show_bug.cgi?id=738202 https://bugzilla.kernel.org/show_bug.cgi?id=32042 https://github.com/mirrors/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a Thanks, -- Petr Matousek / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.