Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Nov 2013 14:39:48 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Kernel MSM - Memory leak in drivers/base/genlock.c

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/25/2013 05:12 AM, Jonathan Salwan wrote:
> Hello,
> 
> The Genlock driver does not properly initialize all members of a
> structure before copying it to user space. This allows a local
> attacker to obtain potentially sensitive information from kernel
> stack memory via ioctl system calls.

This should be classified as CWE-200 Information Disclosure, "memory
leak" refers to memory being used and not released properly, resulting
in out of memory conditions.

> 
> Upstream fixes: 
> https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/drivers/base/genlock.c?id=e3c43027bdb59f03eec7ead0a01c77e4bf801625&h=jb_3.2.3
>
>  Could you please assign a CVE id for this issue?
> 
> Thanks,
> 
> - Jonathan

Please use CVE-2013-6392 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=htq/
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.