|
Message-ID: <4D8C3121.7090907@redhat.com> Date: Fri, 25 Mar 2011 14:07:29 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: Dan Rosenberg <dan.j.rosenberg@...il.com> Subject: Re: CVE request: kernel: two OSS fixes On 03/23/2011 11:56 PM, Dan Rosenberg wrote: > For both issues, access to /dev/sequencer is required, which is > typically reserved for group audio. Additionally, these only affect > systems that use OSS (not to be confused with the OSS emulation layer > provided by ALSA). > > 1. Specially crafted requests may be written to /dev/sequencer > resulting in an underflow when calculating a size for a > copy_from_user() operation in the driver for MIDI interfaces. On x86, > this just returns an error, but it may cause memory corruption on > other architectures. Other malformed requests may result in the use > of uninitialized variables. [1] CVE-2011-1476 > 2. Due to a failure to validate user-supplied indexes in the driver > for Yamaha YM3812 and OPL-3 chips, a specially crafted ioctl request > may be sent to /dev/sequencer, resulting in reading and writing beyond > the bounds of heap buffers, and potentially allowing privilege > escalation. [2] CVE-2011-1477 > [1] http://marc.info/?l=linux-kernel&m=130089204124354&w=2 > [2] http://marc.info/?l=linux-kernel&m=130089499728386&w=2 Thanks, Eugene -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.