oss-sec mailing list archives

Re: [PATCH] acpi: debugfs: fix buffer overflows, double free


From: Eugene Teo <eugeneteo () kernel sg>
Date: Fri, 21 Jan 2011 17:36:53 +0800

On Fri, Jan 21, 2011 at 11:46 +0800, Eugene Teo wrote:
On 01/21/2011 04:08 AM, Vasiliy Kulikov wrote:
File position is not controlled, it may lead to overwrites of arbitrary
kernel memory.  Also the code may kfree() the same pointer multiple
times.

http://lkml.org/lkml/2011/1/20/348
https://bugzilla.redhat.com/CVE-2011-0023

Please use CVE-2011-0023 (this does not include the unresolved flaw
described in the following paragraph below).

One more flaw is still present: if multiple processes open the file then
all 3 static variables are shared, leading to various race conditions.
They should be moved to file->private_data.

Since ed3aada1bf34c this file is available to root only.  This may be
exploited if and only if the file is chmod'ed/chown/ed to nonroot.

That upstream commit has an associated CVE name already. If we take
that into consideration, then this shouldn't be security relevant. I
will reject CVE-2011-0023.

Thanks, Eugene


Current thread: