Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 472384 (CVE-2013-2141) - Kernel : signal: information leak in tkill/tgkill (CVE-2013-2141)
Summary: Kernel : signal: information leak in tkill/tgkill (CVE-2013-2141)
Status: RESOLVED FIXED
Alias: CVE-2013-2141
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-06-05 08:45 UTC by Agostino Sarubbo
Modified: 2021-10-25 00:55 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-06-05 08:45:35 UTC
From ${URL} :

Linux kernel which supports tkill/tgkill routines is vulnerable to an
information leakage flaw. It occurs when routine tkill(2) or tgkill(2) is used
send signal to thread.

A user/program could use this flaw to leak kernel memory bytes.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f

Reference:
----------
 -> http://www.openwall.com/lists/oss-security/2013/06/02/1
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-08-30 01:03:34 UTC
CVE-2013-2141 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2141):
  The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9
  does not initialize a certain data structure, which allows local users to
  obtain sensitive information from kernel memory via a crafted application
  that makes a (1) tkill or (2) tgkill system call.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-25 00:55:21 UTC
In 3.9 onwards