Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 14 Mar 2013 14:56:50 -0700
From: Xin Li <delphij@...phij.net>
To: oss-security@...ts.openwall.com
CC: "Alexander E. Patrakov" <patrakov@...il.com>
Subject: Re: CVE-2013-0913 Linux kernel i915 integer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi, Alexander,

On 03/13/13 09:04, Alexander E. Patrakov wrote:
> 2013/3/12 Kees Cook <keescook@...omium.org>:
>> This flaw could lead to a kernel heap overflow by processes with
>> access to the DRM driver:
>> 
>> https://lkml.org/lkml/2013/3/11/501
> 
> Given that FreeBSD also has some sort of i915kms kernel driver now,
> is it also vulnerable?

Based on our evaluation this also affects FreeBSD and thus we will fix
it similarly.

However, since users using DRM generally already have physical local
access to the system, we do not intend to release a security advisory
for this issue.

Cheers,
- -- 
Xin LI
FreeBSD Deputy Security Officer
-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJRQkeiAAoJEG80Jeu8UPuzf/8H/2ZZJqHvCyZmy04hjnMwtQGD
ooZRc5fGOdWJu77gFCpK8i5EG77dyF0SbuDzSho91uKkLrRQqyMQwr2dz2xiGU4l
wIPxt9UcEXe5oP36ZFU7AdAcD6mYnORTBv1kmTUsfv26Cp+99nTM6vTHCB6hBZFO
SzDsUAaZ6jdl7iemI/QI7WVgKWj5p+ReBFi/WkEcCRaqkrOEDRFyQMvmTwkvTnn2
Sv6L+x1HwiNk2OYsgdm9mJsx2OsUADs7IznPPNZdd5t1/TYQRJKfDbaMdjuv4QgT
VyVUs73w73X4x0Ipyxxcpi1OhrIMYiyOBxnnlqPB5/KAXiivSn4SQu5HOtwqf7o=
=3nVh
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ