Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 27 Feb 2013 11:04:00 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: P J P <ppandit@...hat.com>
Subject: Re: CVE request: Linux kernel: USB: io_ti: NULL pointer
 dereference

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/27/2013 07:09 AM, P J P wrote:
> Hello,
> 
> Linux kernel built with Edgeport USB serial converter driver io_ti,
> is vulnerable to a NULL pointer dereference flaw. It happens if the
> device is disconnected while corresponding /dev/ttyUSB? file is in
> use.
> 
> An unprivileged user could use this flaw to crash the system,
> resulting DoS.
> 
> Upstream fix: ------------- ->
> https://git.kernel.org/linus/1ee0a224bc9aad1de496c795f96bc6ba2c394811
>
>  Reference: ---------- ->
> https://bugzilla.redhat.com/show_bug.cgi?id=916191
> 
> Thank you. -- Prasad J Pandit / Red Hat Security Response Team DB7A
> 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Please use CVE-2013-1774 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIcBAEBAgAGBQJRLkqQAAoJEBYNRVNeJnmTm5cQAJ6D6yOZnJufAnbZJyuD1fej
G9/8cTTMA+819yRqYCn9GAHqLHG9luxlBBdqbppKSHNsqkMRAYFPr2iHBmFVyrio
OCok4gaqjnL5M5MhEyDm7W2+2BTsidTjfjTAJSF+9CncOp4GU1ucrTqNlYJOkLTA
ENvswv+dZ4GG//QXIr3c0lh4VRwRNeduuotC1xhPlSzS/MCobUhldtgvA7rpEygQ
+Fs4z/SsmKHf8CLXhyEE9YWayQ+ccs6yGRyjSUxfrXw3wofYV5MPmcQkxh4jHPUo
CtV9wsGj7VIi3iwkx0oz/q75IpRTqyRfJoaYYGziR56WnpjtPw6FKLJfDeC2qufB
eZs+6ZvX9Z+19V3/9Q3TgGokaSXnbcV+lPxDwQ5hgY2icwnE+uKHPzkFWJ6Nv8jB
fYAMAyC6MRcVItkW+x6bdUWfNmFPI5Fgf0/7Z0oh2sZ4sDB70jtnIDVwEvb0xg7H
CMYE6jeO9n2TfM2Ojt0d/4Fhe1cEcZM6Rqfh3JxzeyRxDCW97sxXlsX+AuuFlSzo
4DgQRQh8HhVvuzZpgNXvl0/OGPUa5PmgPSEGGKriEFmDral2kIkKtPlmqqUrTeXA
bQTzZxpckIwdSs/5DKBVY900eubAJSU1CS7PJmp90AUFMVHych3Frzyar7Q8RFYO
COPY5FwbpdXRD19dOJds
=V9VA
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ