Bug 152745 - Linux Broadcom 5820 Cryptonet Driver Integer Overflow
Summary: Linux Broadcom 5820 Cryptonet Driver Integer Overflow
Keywords:
Status: CLOSED DUPLICATE of bug 2040112
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: Package request
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Fedora Legacy Bugs
QA Contact:
URL: http://cve.mitre.org/cgi-bin/cvename....
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-07-02 03:35 UTC by Dominic Hargreaves
Modified: 2008-05-01 15:38 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description David Lawrence 2005-03-30 23:25:58 UTC
Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820
cryptonet driver allows local users to cause a denial of service (crash) and
possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which
leads to a buffer overflow.

General consensus is that this should be removed, so I guess it's one for after
the release of 35.x.legacy



------- Additional Comments From jp107.ac.uk 2004-07-02 04:31:52 ----

Isn't this a duplicate of 1804?



------- Additional Comments From dom 2004-07-02 04:58:13 ----



*** This bug has been marked as a duplicate of 1804 ***



------- Bug moved to this database by dkl 2005-03-30 18:25 -------

This bug previously known as bug 1810 at https://bugzilla.fedora.us/
https://bugzilla.fedora.us/show_bug.cgi?id=1810
Originally filed under the Fedora Legacy product and Package request component.

Unknown priority P2. Setting to default priority "normal".
Unknown platform PC. Setting to default platform "All".
Setting qa contact to the default for this product.
   This bug either had no qa contact or an invalid one.




Note You need to log in before you can comment on or make changes to this bug.