Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20150224221147.GA20304@pisco.westfalen.local>
Date: Tue, 24 Feb 2015 23:11:47 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE Request: Linux kernel information leak in
 event device handling

On Tue, Jan 20, 2015 at 03:43:00PM +0100, Marcus Meissner wrote:
> Hi,
> 
> This needs a CVE, information leak out of the kernel.
> 
> This probably was introduced by commit 483180281f0ac60d1138710eb21f4b9961901294
> in Linux 3.9.
> 
> Ciao, Marcus
> 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7c4f56070fde2367766fa1fb04852599b5e1ad35
> https://bugzilla.suse.com/show_bug.cgi?id=904899
> 
> Input: evdev - fix EVIOCG{type} ioctl
> 
> The 'max' size passed into the function is measured in number of bits
> (KEY_MAX, LED_MAX, etc) so we need to convert it accordingly before
> trying to copy the data out, otherwise we will try copying too much
> and end up with up with a page fault.
> 
> Reported-by: Pavel Machek <pavel@....cz>
> Reviewed-by: Pavel Machek <pavel@....cz>
> Reviewed-by: David Herrmann <dh.herrmann@...il.com>
> Signed-off-by: Dmitry Torokhov <dmitry.torokhov@...il.com>

This seems to have fallen through the cracks, explicitly adding
cve-assign to CC.

Cheers,
        Moritz

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.