Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 May 2013 12:27:45 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        "Eric S. Raymond" <esr@...rsus.com>,
        Miroslav Lichvar <mlichvar@...hat.com>
Subject: Re: CVE Request -- gpsd 3.9 fixing a denial of service
 flaw

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/02/2013 03:58 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, Eric, Miroslav, vendors,
> 
> GPSD upstream has released 3.9 version: [1]
> http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html
>
>  correcting one denial of service problem [2]: A denial of service
> flaw was found in the way AIS driver packet parser of gpsd, a
> service daemon for mediating access to a GPS, processed certain 
> malformed packets. A remote attacker could provide a
> specially-crafted device input that, when processed would lead to
> gpsd's packet parser crash (gpsd daemon termination).
> 
> References: [2] https://bugzilla.redhat.com/show_bug.cgi?id=958717
> 
> Candidate upstream patches [*]: [3]
> http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=08edc49d8f63c75bfdfb480b083b0d960310f94f
>
> 
[4]
http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50
> 
> -- [*] Candidate because upstream #38511 is private currently: 
> http://savannah.nongnu.org/bugs/?38511 => hard to say if [3] is
> fixing this issue, or the DoS would be caused by the malformed
> packet crash / sample, as listed in [4].
> 
> @Eric - Eric, could you please help us to solve this doubt? (which 
> of the patches is the correct one to fix the above mentioned DoS /
> security issue)
> 
> Thanks: Goes to Miroslav Lichvar for bringing this one to my
> attention.
> 
> Kurt, could you allocate a CVE identifier for this?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> 

Just a quick note, at least on Fedora when you plug in a USB GPS
device, by default the OS handles it, fires up gpsd. So with this you
could make a crash usb stick or something.

Please use CVE-2013-2038 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=Bn4W
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.