oss-sec mailing list archives

Re: http://www.securityfocus.com/bid/33672/info kernel issue


From: Marcus Meissner <meissner () suse de>
Date: Mon, 3 Aug 2009 16:07:36 +0200

On Thu, Feb 12, 2009 at 09:22:59PM +0100, Marcus Meissner wrote:
On Thu, Feb 12, 2009 at 08:05:27PM +0000, Mark J Cox wrote:
http://www.securityfocus.com/bid/33672/ seems to be this commit:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.28.y.git;a=commit;h=8255fc826e58c0a59711029e01db9fcdc06ba211
Not sure if its exploitable though.

BTW that BID list of affected kernels isn't correct; the multibyte stuff 
wasn't in <=2.6.18 at least.

I didn't check exactly where since it doesn't affect RHEL and didn't look 
into the issue any further -- but on first glance it seemed like you'd 
have to be a console user and display/select some carefully chosen 
characters in order to do the overflow; so it's probably a 'local attacker 
at keyboard' flaw?

We backported Unicode stuff to SLES 10 I just see, but yes, 2.6.18 then.

Yes, console user only. And you can overflow 2 bytes over the end of kmalloced
space, not sure how much you can do with this.

New reference for the CVE-2009-1046 entry and a exploit:

http://kernelbof.blogspot.com/2009/07/even-when-one-byte-matters.html

Ciao, Marcus


Current thread: