Bug 457995 (CVE-2008-3272) - CVE-2008-3272 kernel snd_seq_oss_synth_make_info leak
Summary: CVE-2008-3272 kernel snd_seq_oss_synth_make_info leak
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-3272
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 457997 457998 457999 458000 458001
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-08-06 01:59 UTC by Eugene Teo (Security Response)
Modified: 2019-09-29 12:26 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-12-23 21:40:54 UTC


Attachments (Terms of Use)
Upstream patch for this issue (1.24 KB, patch)
2008-08-06 02:05 UTC, Eugene Teo (Security Response)
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0857 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2008-10-07 19:18:59 UTC
Red Hat Product Errata RHSA-2008:0885 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2008-09-24 18:45:31 UTC
Red Hat Product Errata RHSA-2008:0972 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2008-11-19 13:44:42 UTC

Description Eugene Teo (Security Response) 2008-08-06 01:59:34 UTC
Description of problem:
Tobias Klein reported that the snd_seq_oss_synth_make_info() function incorrectly reports information to userspace without first checking for the validity of the device number, leading to possible information leak.

Comment 2 Eugene Teo (Security Response) 2008-08-06 02:05:43 UTC
Created attachment 313512 [details]
Upstream patch for this issue

Comment 6 Vincent Danen 2010-12-23 21:40:54 UTC
This was addressed via:

MRG Realtime for RHEL 5 Server (RHSA-2008:0857)
Red Hat Enterprise Linux version 5 (RHSA-2008:0885)
Red Hat Enterprise Linux version 4 (RHSA-2008:0972)


Note You need to log in before you can comment on or make changes to this bug.