Date: Wed, 23 Mar 2011 11:56:05 -0400 From: Dan Rosenberg <dan.j.rosenberg@...il.com> To: oss-security@...ts.openwall.com Subject: CVE request: kernel: two OSS fixes For both issues, access to /dev/sequencer is required, which is typically reserved for group audio. Additionally, these only affect systems that use OSS (not to be confused with the OSS emulation layer provided by ALSA). 1. Specially crafted requests may be written to /dev/sequencer resulting in an underflow when calculating a size for a copy_from_user() operation in the driver for MIDI interfaces. On x86, this just returns an error, but it may cause memory corruption on other architectures. Other malformed requests may result in the use of uninitialized variables.  2. Due to a failure to validate user-supplied indexes in the driver for Yamaha YM3812 and OPL-3 chips, a specially crafted ioctl request may be sent to /dev/sequencer, resulting in reading and writing beyond the bounds of heap buffers, and potentially allowing privilege escalation.   http://marc.info/?l=linux-kernel&m=130089204124354&w=2  http://marc.info/?l=linux-kernel&m=130089499728386&w=2
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.