Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 18 Mar 2021 07:04:00 +0100
From: Salvatore Bonaccorso <>
Subject: Re: CVE-2020-35519 Linux kernel: x25_bind
 out-of-bounds read


On Wed, Mar 17, 2021 at 05:14:57PM -0400, Sasha Levin wrote:
> On Thu, Mar 18, 2021 at 01:20:18AM +0530, Rohit Keshri wrote:
> > Hello Team,
> > 
> > An out-of-bounds (OOB) memory access flaw was found in x25_bind in
> > net/x25/af_x25.c in the Linux kernel. A bounds check failure allows a local
> > attacker with a user account on the system to gain access to out-of-bounds
> > memory, leading to a system crash or a leak of internal kernel information.
> > The highest threat from this vulnerability is to confidentiality,
> > integrity, as well as system availability.
> > 
> > 'CVE-2020-35519' was assigned by Red Hat.
> This mail doesn't even mention where/how this is fixed. Is this
> 6ee50c8e262a ("net/x25: prevent a couple of overflows")?
> If so, it's already fixed in all stable kernels.
> How can the issue cause a leak btw?

Just as additional reference: I think this goes back to this report: 

In upstream this was fixed then if the above is correct in



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.