oss-sec mailing list archives

Re: CVE Request -- kernel: compat: SIOCGSTAMP/SIOCGSTAMPNS incorrect order of arguments to compat_put_time[val|spec]


From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 03 Oct 2012 20:10:25 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/03/2012 04:08 PM, Petr Matousek wrote:
Description of the problem:

Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in 
net/socket.c") introduced a bug where the helper functions to take 
either a 64-bit or compat time[spec|val] got the arguments in the
wrong order, passing the kernel stack pointer off as a user pointer
(and vice versa).

On architectures that use separate address spaces for userspace
and kernel (for example PA-RISC), an unprivileged local user can
crash the system or read kernel memory.

Introduced in: 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=644595f89620

 Upstream fix: 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=ed6fe9d614f

 Acknowledgements:

This issue was discovered by Mikulas Patocka of Red Hat.

Thanks,


Please use CVE-2012-4467 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=uzYd
-----END PGP SIGNATURE-----


Current thread: