|
Message-ID: <CABEk9YzHK2jN5YHzTSVWRaMyGZiNcqZXT29zD9=N+ZG9Vzw=RQ@mail.gmail.com> Date: Tue, 10 May 2016 15:27:58 -0400 From: Kangjie Lu <kangjielu@...il.com> To: oss-security@...ts.openwall.com, Chengyu Song <csong84@...ech.edu>, Insu Yun <insu@...ech.edu>, Taesoo Kim <taesoo@...ech.edu> Subject: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer Hello, In function snd_timer_user_ccallback() of file sound/core/timer.c, the stack object “r1” has a total size of 32 bytes. Its field “event” and “val” both contain 4 bytes padding. These 8 bytes padding bytes are sent to user without being initialized. Fix info: https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 Patch has been applied: http://comments.gmane.org/gmane.linux.kernel/2214250 Please help assign a CVE to this vulnerability. Thanks, Kangjie Lu
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.