Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160510191435.GA12598@nxnw.org>
Date: Tue, 10 May 2016 12:14:35 -0700
From: Steve Beattie <steve.beattie@...onical.com>
To: oss-security@...ts.openwall.com
Cc: kangjielu@...il.com, cve-assign@...re.org, csong84@...ech.edu,
	insu@...ech.edu, taesoo@...ech.edu
Subject: Re: Re: CVE Request: kernel information leak
 vulnerability in Linux sound module

On Mon, May 09, 2016 at 07:29:09PM -0400, cve-assign@...re.org wrote:
> > http://comments.gmane.org/gmane.linux.kernel/2214250
> > 
> > The stack object "tread" has a total size of 32 bytes. Its field
> > "event" and "val" both contain 4 bytes padding. These 8 bytes
> > padding bytes are sent to user without being initialized.
> 
> Use CVE-2016-4569.
> 
> This is not yet available at
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/sound/core/timer.c
> but may be there later.

It's staged at:

  https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=cec8f96e49d9be372fdb0c3836dcf31ec71e457e

Looks like there were two more related kernel leak fixes:

  https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
  https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=e4ec8cc8039a7063e24204299b462bd1383184a5

Thanks.
-- 
Steve Beattie
<sbeattie@...ntu.com>
http://NxNW.org/~steve/

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.