Return-Path: Sender: "Gustavo F. Padovan" Date: Tue, 28 Jun 2011 14:59:37 -0300 From: "Gustavo F. Padovan" To: Dan Rosenberg Cc: marcel@holtmann.org, davem@davemloft.net, linux-bluetooth@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, security@kernel.org Subject: Re: [PATCH] Bluetooth: Prevent buffer overflow in l2cap config request Message-ID: <20110628175937.GA23183@joana> References: <1308919085.5295.11.camel@dan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: <1308919085.5295.11.camel@dan> List-ID: Hi Dan, * Dan Rosenberg [2011-06-24 08:38:05 -0400]: > A remote user can provide a small value for the command size field in > the command header of an l2cap configuration request, resulting in an > integer underflow when subtracting the size of the configuration request > header. This results in copying a very large amount of data via > memcpy() and destroying the kernel heap. Check for underflow. > > Signed-off-by: Dan Rosenberg > Cc: stable > --- > net/bluetooth/l2cap_core.c | 2 +- > 1 files changed, 1 insertions(+), 1 deletions(-) Applied, thanks. Gustavo