Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 472384 (CVE-2013-2141)

Summary: Kernel : signal: information leak in tkill/tgkill (CVE-2013-2141)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=970873
Whiteboard:
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-06-05 08:45:35 UTC
From ${URL} :

Linux kernel which supports tkill/tgkill routines is vulnerable to an
information leakage flaw. It occurs when routine tkill(2) or tgkill(2) is used
send signal to thread.

A user/program could use this flaw to leak kernel memory bytes.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f

Reference:
----------
 -> http://www.openwall.com/lists/oss-security/2013/06/02/1
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-08-30 01:03:34 UTC
CVE-2013-2141 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2141):
  The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9
  does not initialize a certain data structure, which allows local users to
  obtain sensitive information from kernel memory via a crafted application
  that makes a (1) tkill or (2) tgkill system call.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-25 00:55:21 UTC
In 3.9 onwards