Bug 288961 (CVE-2007-4571) - CVE-2007-4571 ALSA memory disclosure flaw
Summary: CVE-2007-4571 ALSA memory disclosure flaw
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2007-4571
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 297741 297751 297761 297771
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-09-13 08:32 UTC by Mark J. Cox
Modified: 2023-05-11 12:46 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-09-28 22:58:56 UTC
Embargoed:


Attachments (Terms of Use)
Proposed patch (1.34 KB, patch)
2007-09-13 08:33 UTC, Mark J. Cox
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0939 0 normal SHIPPED_LIVE Important: kernel security update 2008-01-07 18:58:13 UTC
Red Hat Product Errata RHSA-2007:0993 0 normal SHIPPED_LIVE Important: kernel security update 2007-11-29 14:46:49 UTC

Description Mark J. Cox 2007-09-13 08:32:05 UTC
iDefense reported a flaw in ALSA snd_mem_proc_read.  A local user who has the
ability to read the /proc/driver/snd-page-alloc file could potentially gain
access to read sensitive information from kernel memory.

CVSS v2 Base score: 2.1  (Low) (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Acknowledgements:

Red Hat would like to credit iDefense and Neil Kettle for reporting this issue.

Comment 2 Mark J. Cox 2007-09-13 08:33:29 UTC
Created attachment 194421 [details]
Proposed patch

Comment 3 Mark J. Cox 2007-09-13 08:40:15 UTC
        Doesn't Affect: rhel-2.1 (no snd_mem_proc_read)
        Doesn't Affect: rhel-3 (no snd_mem_proc_read)
        Probably Affects: rhel-4
        Probably Affects: rhel-5


Comment 5 Mark J. Cox 2007-09-14 09:06:25 UTC
Exploiting this issue will give the user the ability to see a number of
uninitialized bytes, up to 41 bytes, but they have no control over what they see.

Comment 11 Mark J. Cox 2007-09-25 15:53:07 UTC
Now public via
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=600
removing embargo

Comment 17 Kurt Seifried 2011-09-28 22:58:56 UTC
All children bugs have been closed, parent is no longer needed.


Note You need to log in before you can comment on or make changes to this bug.