[kernel-sec-discuss] r2854 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Fri Mar 15 13:44:51 UTC 2013
Author: jmm
Date: 2013-03-15 13:44:29 +0000 (Fri, 15 Mar 2013)
New Revision: 2854
Added:
active/CVE-2013-2546
active/CVE-2013-2547
active/CVE-2013-2548
Removed:
active/CVE-2013-1825
Log:
CVE ID was split by CVE beaurecrats...
Deleted: active/CVE-2013-1825
===================================================================
--- active/CVE-2013-1825 2013-03-14 15:36:17 UTC (rev 2853)
+++ active/CVE-2013-1825 2013-03-15 13:44:29 UTC (rev 2854)
@@ -1,10 +0,0 @@
-References:
- http://seclists.org/oss-sec/2013/q1/598
-Description: information leak in crypto API
-Notes:
-Bugs:
-upstream: released (3.9-rc1) [9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6]
-2.6.32-upstream-stable:
-sid: needed
-2.6.32-squeeze-security:
-3.2-upstream-stable: needed
Added: active/CVE-2013-2546
===================================================================
--- active/CVE-2013-2546 (rev 0)
+++ active/CVE-2013-2546 2013-03-15 13:44:29 UTC (rev 2854)
@@ -0,0 +1,12 @@
+References:
+ http://seclists.org/oss-sec/2013/q1/598
+Description: information leak in crypto API
+Notes:
+ jmm> This ID is about
+ jmm> The structures used for the netlink based crypto algorithm report API are located on the stack. As snprintf() does not fill the remainder of the buffer with null bytes, those stack bytes will be disclosed to users of the API. Switch to strncpy() to fix this.
+Bugs:
+upstream: released (3.9-rc1) [9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6]
+2.6.32-upstream-stable:
+sid: needed
+2.6.32-squeeze-security:
+3.2-upstream-stable: needed
Added: active/CVE-2013-2547
===================================================================
--- active/CVE-2013-2547 (rev 0)
+++ active/CVE-2013-2547 2013-03-15 13:44:29 UTC (rev 2854)
@@ -0,0 +1,12 @@
+References:
+ http://seclists.org/oss-sec/2013/q1/598
+Description: information leak in crypto API
+Notes:
+ jmm> This ID is about
+ jmm> crypto_report_one() does not initialize all field of struct crypto_user_alg. Fix this to fix the heap info leak.
+Bugs:
+upstream: released (3.9-rc1) [9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6]
+2.6.32-upstream-stable:
+sid: needed
+2.6.32-squeeze-security:
+3.2-upstream-stable: needed
Added: active/CVE-2013-2548
===================================================================
--- active/CVE-2013-2548 (rev 0)
+++ active/CVE-2013-2548 2013-03-15 13:44:29 UTC (rev 2854)
@@ -0,0 +1,12 @@
+References:
+ http://seclists.org/oss-sec/2013/q1/598
+Description: information leak in crypto API
+Notes:
+ jmm> This ID is about
+ jmm> For the module name we should copy only as many bytes as module_name() returns -- not as much as the destination buffer could hold. But the current code does not and therefore copies random data from behind the end of the module name, as the module name is always shorter than CRYPTO_MAX_ALG_NAME.
+Bugs:
+upstream: released (3.9-rc1) [9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6]
+2.6.32-upstream-stable:
+sid: needed
+2.6.32-squeeze-security:
+3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list