Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YFJxUTwEHsaHhO7/@sashalap>
Date: Wed, 17 Mar 2021 17:14:57 -0400
From: Sasha Levin <sashal@...nel.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2020-35519 Linux kernel: x25_bind
 out-of-bounds read

On Thu, Mar 18, 2021 at 01:20:18AM +0530, Rohit Keshri wrote:
>Hello Team,
>
>An out-of-bounds (OOB) memory access flaw was found in x25_bind in
>net/x25/af_x25.c in the Linux kernel. A bounds check failure allows a local
>attacker with a user account on the system to gain access to out-of-bounds
>memory, leading to a system crash or a leak of internal kernel information.
>The highest threat from this vulnerability is to confidentiality,
>integrity, as well as system availability.
>
>'CVE-2020-35519' was assigned by Red Hat.

This mail doesn't even mention where/how this is fixed. Is this
6ee50c8e262a ("net/x25: prevent a couple of overflows")?

If so, it's already fixed in all stable kernels.

How can the issue cause a leak btw?

-- 
Thanks,
Sasha

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.