Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 05 Jun 2013 13:29:43 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: P J P <ppandit@...hat.com>
Subject: Re: CVE request: kernel: cpqarray/c: info leak in
 ida_locked_ioctl()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/05/2013 01:23 AM, P J P wrote:
>   Hello
> 
> A Linux kernel built with the Compaq SMART2(CONFIG_BLK_CPQ_DA) & Compaq
> Smart Array 5xxx(CONFIG_BLK_CPQ_CISS_DA) support is vulnerable to an
> information leakage flaw. This could occur while doing an ioctl(2) calls
> on the block device with command `IDAGETPCIINFO' or `CCISS_PASSTHRU32'.
> 
> A user/program could use this flaw to leak kernel memory bytes.
> 
> Upstream fixes:
> ---------------
>  -> https://lkml.org/lkml/2013/6/3/131
>  -> https://lkml.org/lkml/2013/6/3/127
> 
> 
> Thank you.
> -- 
> Prasad J Pandit / Red Hat Security Response Team
> DB7A 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Please use CVE-2013-2147 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=5B0a
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ