Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 04 Nov 2013 13:20:40 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: some unstracked linux kernel security fixes

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/03/2013 09:32 AM, Nico Golde wrote:
> Hi, Fabian Yamaguchi and myself stumbled upon a few kernel issues.
> 
> Can someone assign CVE ids for these?
> 
> drivers/uio/uio.c: mapping of physical memory to user space without
> proper size check drivers/video/au1100fb.c: integer overflow in
> checking of range when mapping physical memory to user space 
> drivers/video/au1200fb.c: integer overflow in checking of range
> when mapping physical memory to user space 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7314e613d5ff

Please
> 
use CVE-2013-4511 for this issue.

> arch/um/kernel/exitcode.c: buffer overflow in write syscall
> handler 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=201f99f170df14ba52ea4c52847779042b7a623b

Please
> 
use CVE-2013-4512 for this issue.

> drivers/staging/ozwpan/ozcdev.c: buffer overflow in write syscall
> handler 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c2c65cd2e14ada6de44cb527e7f1990bede24e15

Please
> 
use CVE-2013-4513 for this issue.

> drivers/staging/wlags49_h2/wl_priv.c: buffer overflow when setting
> station name 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5e2f339865fb443107e5b10603e53bbc92dc054

Please
> 
use CVE-2013-4514 for this issue.

> drivers/staging/bcm/Bcmchar.c: kernel memory disclosure via
> uninitialized structure members 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d1e72250c847fa96498ec029891de4dc638a5ba

Please
> 
use CVE-2013-4515 for this issue.

> drivers/staging/sb105x/sb_pci_mp.c: kernel memory disclosure via
> uninitialized structure members 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a8b33654b1e3b0c74d4a1fed041c9aae50b3c427

Please
> 
use CVE-2013-4516 for this issue.

> Thanks Nico
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iQIcBAEBAgAGBQJSeAGYAAoJEBYNRVNeJnmT9WsP/0v90gW0nCVbDhV9GcYRSUcm
1S7urfq/qAMM0D4FfZ0f6SkJfy4eL0UNibh1s6VSUHOLjswllbn+693GYup7ngF4
M4OgSItoUZcIzBN0dXRe232jemHcKNVIYTxQrnh0aj7Otpc5B37073j1nM2LfGHk
JbOu2UArEUnktMGUHwFJe4cos/YFv965WdO0q8cES6kuC2WAgvnhVolniyd8UPG5
4BhqN2MW8vDUh3qOkCwyOnNRnooSJoHZ0n+0TuGSx5i8zM3vdvSaJIKaF6YTeBC6
lGFhCTxRh5Gq5AgS0+91BwoHL5VQoYs7S1r/qWIEQ6Eb571c64dHF26gSOCjW329
dFk9GK9sTIFzpVSxVXdNRdCGNp452Hu59M+qMLzNgF8zcGBcCCs8jY2Kyauc+daV
sm7AIeJcnr3CzdeeQxRO9UzAZkmfmlM3hUdfEhQpxmbfqVYa9eyYOUZCqS9YQ1gE
R6D7B28N3BBXJsjE5u6in5JWXsChLyAokYpDPF9oLkaBDsYTh6XwTjgCl2Y/C9WB
mfjfUc9U4oxWWQUWHDPweozZheTb/U71cIFOSvqDaXvd+UMh3ubr5tz0OExcmFgO
KMVqicNTQSMXJzoBq8Ag5HTOViIsi1ijPJkA8RwLOQyI0LSaRBmiKWAJi4RW3T96
nDtUr8SaPAKpDTDnDpQm
=aZQ9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.