Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 20 Mar 2013 01:54:19 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Mathias Krause <minipli@...glemail.com>
Subject: Re: Linux kernel: net - three info leaks in rtnl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/19/2013 03:15 PM, Mathias Krause wrote:
> I fixed a few more info leaks in linux v3.9-rc3. Unprivileged
> users can use the netlink interface to exploit the following issues
> to disclose kernel stack memory:
> 
> 29cd8ae dcbnl: fix various netlink info leaks 
> http://git.kernel.org/linus/29cd8ae0e1a39e239a3a7b67da1986add1199fc0
>
>  84d73cd rtnl: fix info leak on RTM_GETLINK request for VF devices 
> http://git.kernel.org/linus/84d73cd3fb142bf1298a8c13fd4ca50fd2432372
>
>  c085c49 bridge: fix mdb info leaks 
> http://git.kernel.org/linus/c085c49920b2f900ba716b4ca1c1a55ece9872cc
>
>  David Miller did backports for the above issues which are
> currently under review and should end up in the next stable and
> longterm kernels.
> 
> Regards, Mathias

CVE Merge - same researcher/vuln/version. Please use CVE-2013-1873 for
these issues.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIcBAEBAgAGBQJRSWsrAAoJEBYNRVNeJnmTRJgP/A5M6zi0J5ZgPyjk/vnIDCDN
auSwOGihNdEc8abVjQtuo5mepmOdeKZsH6SLtxgIxTNXR2AI2Uov9prnDbuBx4HB
cZrhD2Pc5kPIdQX/eSG8ZkzSTAnDIRA6DUI4BjHelzyVobkKObq8yTgISEBpuk/R
wzC7YMLYuvTiA31VzG34cPrYKKSzcb6E6RkgwViCDNgRkhVsbqD1FwqH7+HIcZeA
pW3pahTvRXOfaZ99WtEylEjsvGlE9eFHHBrC8s6zMsauINdZJGDzFdhkTJcnjQcG
0AeiRk056gApe/MTj8ZyrJM65/X1Z3eYfl+cdZcddPgpVQQ4av6ks7xdOz+MBe8B
1TUbYrhWJnz7tNBBHj03uWaCDnl/eZXaThCuokI17inN9ILRrhQV8snQtnVt9aDM
fO+bB0Qdj6lmzhHYaCOr64E885AyHCLHHp6teqp3PvXnkaTkpb2kUQcRlDKOoXXu
MRoos6EZSHRxOaJDl2x7JJsr5h47F/IAHjvLqcFVMdCnixaoslj1M1Lat7JmFcc3
WNVM6Gq662qxcsSwcNumSmuzV30nCZ5/WBuF0RR6rRxLeEHqELsT7eUsjbZEwB69
lxsYjCh0CldhZruaMtuRSaq5exvcjLXipFfO4M65Aw1BywEV6R5YBhpyP4NcAWzr
rCpafMk9J0eim/ryXrck
=bW6B
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.