Bug 922404 (CVE-2012-6545)

Summary: CVE-2012-6545 Kernel: Bluetooth: RFCOMM - information leak
Product: [Other] Security Response Reporter: Prasad Pandit <ppandit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agordeev, anton, bhu, davej, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, jonathan, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lwang, madhu.chinakonda, mcressma, plougher, rt-maint, rvrbovsk, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-06-09 18:02:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 922406, 922407, 922408, 922409    
Bug Blocks: 858947    

Description Prasad Pandit 2013-03-16 17:53:55 UTC
Linux kernel built with Bluetooth networking with RFCOMM protocol support
is vulnerable to information leakage flaws. These occur while calling
getsockname, getsockopt(BT_SECURITY), and ioctl(RFCOMMGETDEVLIST) routines.

A user/program could use this flaw to leak kernel memory bytes.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/9344a972961d1a6d2c04d9008b13617bcb6ec2ef
 -> https://git.kernel.org/linus/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
 -> https://git.kernel.org/linus/9ad2de43f1aee7e7274a4e0d41465489299e344b

Reference:
----------
 -> http://www.openwall.com/lists/oss-security/2013/03/14/21

Comment 1 Prasad Pandit 2013-03-16 17:58:36 UTC
Statement:

This issue does not affect the version of the kernel package as shipped with
Red Hat Enterprise MRG 2.

This issue affects the versions of Linux kernel as shipped with
Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. Future kernel
updates for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6 may
address this issue.

Comment 3 errata-xmlrpc 2013-07-10 03:53:23 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1034 https://rhn.redhat.com/errata/RHSA-2013-1034.html

Comment 4 errata-xmlrpc 2013-11-21 17:05:59 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1645 https://rhn.redhat.com/errata/RHSA-2013-1645.html