
oss-sec mailing list archives
Re: some unstracked linux kernel security fixes
From: Kurt Seifried <kseifried () redhat com>
Date: Mon, 04 Nov 2013 13:20:40 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/03/2013 09:32 AM, Nico Golde wrote:
Hi, Fabian Yamaguchi and myself stumbled upon a few kernel issues. Can someone assign CVE ids for these? drivers/uio/uio.c: mapping of physical memory to user space without proper size check drivers/video/au1100fb.c: integer overflow in checking of range when mapping physical memory to user space drivers/video/au1200fb.c: integer overflow in checking of range when mapping physical memory to user space https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7314e613d5ff
Please
use CVE-2013-4511 for this issue.
arch/um/kernel/exitcode.c: buffer overflow in write syscall handler https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=201f99f170df14ba52ea4c52847779042b7a623b
Please
use CVE-2013-4512 for this issue.
drivers/staging/ozwpan/ozcdev.c: buffer overflow in write syscall handler https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c2c65cd2e14ada6de44cb527e7f1990bede24e15
Please
use CVE-2013-4513 for this issue.
drivers/staging/wlags49_h2/wl_priv.c: buffer overflow when setting station name https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5e2f339865fb443107e5b10603e53bbc92dc054
Please
use CVE-2013-4514 for this issue.
drivers/staging/bcm/Bcmchar.c: kernel memory disclosure via uninitialized structure members https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d1e72250c847fa96498ec029891de4dc638a5ba
Please
use CVE-2013-4515 for this issue.
drivers/staging/sb105x/sb_pci_mp.c: kernel memory disclosure via uninitialized structure members https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Please
use CVE-2013-4516 for this issue.
Thanks Nico
- -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJSeAGYAAoJEBYNRVNeJnmT9WsP/0v90gW0nCVbDhV9GcYRSUcm 1S7urfq/qAMM0D4FfZ0f6SkJfy4eL0UNibh1s6VSUHOLjswllbn+693GYup7ngF4 M4OgSItoUZcIzBN0dXRe232jemHcKNVIYTxQrnh0aj7Otpc5B37073j1nM2LfGHk JbOu2UArEUnktMGUHwFJe4cos/YFv965WdO0q8cES6kuC2WAgvnhVolniyd8UPG5 4BhqN2MW8vDUh3qOkCwyOnNRnooSJoHZ0n+0TuGSx5i8zM3vdvSaJIKaF6YTeBC6 lGFhCTxRh5Gq5AgS0+91BwoHL5VQoYs7S1r/qWIEQ6Eb571c64dHF26gSOCjW329 dFk9GK9sTIFzpVSxVXdNRdCGNp452Hu59M+qMLzNgF8zcGBcCCs8jY2Kyauc+daV sm7AIeJcnr3CzdeeQxRO9UzAZkmfmlM3hUdfEhQpxmbfqVYa9eyYOUZCqS9YQ1gE R6D7B28N3BBXJsjE5u6in5JWXsChLyAokYpDPF9oLkaBDsYTh6XwTjgCl2Y/C9WB mfjfUc9U4oxWWQUWHDPweozZheTb/U71cIFOSvqDaXvd+UMh3ubr5tz0OExcmFgO KMVqicNTQSMXJzoBq8Ag5HTOViIsi1ijPJkA8RwLOQyI0LSaRBmiKWAJi4RW3T96 nDtUr8SaPAKpDTDnDpQm =aZQ9 -----END PGP SIGNATURE-----
Current thread:
- some unstracked linux kernel security fixes Nico Golde (Nov 03)
- Re: some unstracked linux kernel security fixes Kurt Seifried (Nov 04)
- Re: some unstracked linux kernel security fixes Petr Matousek (Nov 12)
- Re: some unstracked linux kernel security fixes Petr Matousek (Nov 14)
- Re: some unstracked linux kernel security fixes Dan Carpenter (Nov 14)
- Re: some unstracked linux kernel security fixes Petr Matousek (Nov 14)
- kernel: uio: CVE-2013-6763 [was: Re: [oss-security] some unstracked linux kernel security fixes] Petr Matousek (Nov 26)
- Re: kernel: uio: CVE-2013-6763 [was: Re: [oss-security] some unstracked linux kernel security fixes] Greg Kroah-Hartman (Dec 02)
- Re: kernel: uio: CVE-2013-6763 [was: Re: [oss-security] some unstracked linux kernel security fixes] Linus Torvalds (Dec 02)
- Re: kernel: uio: CVE-2013-6763 [was: Re: [oss-security] some unstracked linux kernel security fixes] Petr Matousek (Dec 04)
- Re: some unstracked linux kernel security fixes Petr Matousek (Nov 14)