Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 10 May 2016 15:27:58 -0400
From: Kangjie Lu <kangjielu@...il.com>
To: oss-security@...ts.openwall.com, Chengyu Song <csong84@...ech.edu>, 
	Insu Yun <insu@...ech.edu>, Taesoo Kim <taesoo@...ech.edu>
Subject: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer

Hello,

In function snd_timer_user_ccallback() of file sound/core/timer.c,
the stack object “r1” has a total size of 32 bytes. Its field “event” and
“val” both
contain 4 bytes padding. These 8 bytes padding bytes are sent to user
without
being initialized.

Fix info:
https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
Patch has been applied: http://comments.gmane.org/gmane.linux.kernel/2214250

Please help assign a CVE to this vulnerability.

Thanks,
Kangjie Lu

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ