Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABEk9YyTYLpTE0Q5wtvqdHirJd6-2sdJ6Y2YE_kty+wi3DB4jw@mail.gmail.com>
Date: Sun, 8 May 2016 18:16:50 -0400
From: Kangjie Lu <kangjielu@...il.com>
To: oss-security@...ts.openwall.com, Chengyu Song <csong84@...ech.edu>, 
	Insu Yun <insu@...ech.edu>, Taesoo Kim <taesoo@...ech.edu>
Subject: CVE Request: kernel information leak vulnerability in Linux sound module

Hello,

In file sound/core/timer.c of the latest mainline Linux kernel, the stack
object “tread” has a total size of 32 bytes. It contains a 8-bytes padding,
which is not initialized but sent to user via copy_to_user, resulting a
kernel leak.

Fix info:
http://comments.gmane.org/gmane.linux.kernel/2214250


Please help assign a CVE to this vulnerability.


Thanks,
Kangjie Lu

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.