|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0839: kernel tty DoS | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Sebastian Krahmer <krahmer> |
| Component: | Incidents | Assignee: | Marcus Meissner <meissner> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | afx, qa-bugs, security-team, vojtech |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2005-0839: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
Patch extracted from 2.6.9-rc4
A fix for the N_MOUSE vulnerability. |
||
|
Description
Sebastian Krahmer
2004-10-13 22:17:21 UTC
<!-- SBZ_reproduce --> ... CAN-2004-0814 Created attachment 25174 [details]
Patch extracted from 2.6.9-rc4
The diff between the SL9.2 kernel and 2.6.9-rc4 has these changes to
drivers/char/tty_io.c. This should fix the line discipline oops mentioned
by Alan
it is pretty large. Olaf, how important do you consider this for fixing, - for SLES9 perhaps? - for 9.2 ... i dont think that important. - SLES 8 ? Hm... the severity depends on who is able to mess with the line discipline. I _thought_ only root is allowed to do that because you don't want Joe Doe injecting random PPP frames. But it seems that was changed long ago, and now anyone is permitted to do this (maybe someone should test the exploit Alan posted to vendor-sec). So this means we do need this huge fix for SP1? And even update kernels? What's the status? I'm not sure if we urgently need to fix that. But one option may be to simply refuse changing the line discipline if the caller isn't privileged. Shouldn't break PPP as pppd needs root anyway to do ioctls on /dev/ppp and setting up the interface. I don't think we have anything that runs with user privs and wants to mess with N_MOUSE either. And all the other line disciplines are for AX25 and stuff. I _think_ TIOCSETLD was a privileged operation in 2.4 but I may be mistaken The patch itself looks reasonable to me, but I'd like a second opinion. Vojtech, would you please comment on a) Alan's patch b) the idea of making TIOCSETLD a privileged ioctl a) Alan's patch looks OK, and seems to be doing what it promises to, however regarding overall correctness I can't comment due to its size. b) I lived under the impression (until yesterday or so) that TIOCSETLD *was* a privileged operation. I think it's a good idea to be so, and like you can't find any case where that'd hurt. Anyway, if we were to ignore the patch and just make changing line discpline privileged, that still doesn't fix all the revoke() races. TIOCSETD does not appear to be privileged reading 2.4.29 vanilla sources. i still do not know how to proceed here. Well, for b), an easy solution is to add a check into serport_open() for root privileges and do an return -EPERM there if it's called by an unprivileged user. This will not break anything, and close the serio hole. Good. Please provide a patch that Hubert can apply to all kernel branches, then assign this bug to him. Thanks. Created attachment 28014 [details]
A fix for the N_MOUSE vulnerability.
Patch attached, reassigning ... Hubert, please apply it to all kernel branches. Not in 9.2 branch yet. Not in SLES9_SP1 branch yet. Hubert ... please apply the second (smaller ;) patch to the 2.6 branches. Ok, it's in all 2.6 branches now. surface for QA. updates and advisory released. the N_MOUSE fix is CAN-2005-0839 CVE-2005-0839: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) |