First published: Wed Feb 16 2011(Updated: )
Description of problem: Use strlcpy() to assure not to overflow the string array sizes by too long USB device name string (unlikely). This only affects Native Instruments USB audio devices. Proposed patch: <a href="http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commitdiff;h=eaae55dac6b64c0616046436b294e69fc5311581">http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commitdiff;h=eaae55dac6b64c0616046436b294e69fc5311581</a> Acknowledgements: Red Hat would like to thank Rafael Dominguez Vega for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.38 | |
Linux Kernel | =2.6.38 | |
Linux Kernel | =2.6.38-rc1 | |
Linux Kernel | =2.6.38-rc2 | |
Linux Kernel | =2.6.38-rc3 | |
Ubuntu Linux | =8.04 | |
Linux kernel | <2.6.38 | |
Linux kernel | =2.6.38 | |
Linux kernel | =2.6.38-rc1 | |
Linux kernel | =2.6.38-rc2 | |
Linux kernel | =2.6.38-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0712 is classified as a low severity vulnerability involving the potential overflow of string array sizes.
CVE-2011-0712 specifically affects Native Instruments USB audio devices and is unlikely to cause significant issues.
To address CVE-2011-0712, users should apply the proposed patch that uses strlcpy() to handle USB device name strings safely.
CVE-2011-0712 affects Linux kernel versions up to 2.6.38, including release candidates and specific distributions.
Exploitation of CVE-2011-0712 is unlikely due to its specific impact on USB device name handling.