|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0532: kernel: sign handling issues in 2.6 | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Marcus Meissner <meissner> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | ihno, mfrueh, patch-request, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2005-0532: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
reiserfs-signed.patch
proc-read-signedness.patch copyfromreadbuf-signedness.patch proc-read-signedness.patch reiserfs-signed.patch fs-readwrite-signedness.patch always-accessok-checks.patch verify-area-rename.patch f-maxcount.patch 2.4-fsmaxcount-rwverifylock.patch CAN-2005-0136_ia64-kernel.diff |
||
|
Description
Thomas Biege
2005-01-31 17:35:32 UTC
<!-- SBZ_reproduce --> - Created attachment 28196 [details]
reiserfs-signed.patch
from last bk chset
Created attachment 28197 [details] proc-read-signedness.patch http://linux.bkbits.net:8080/linux-2.6/cset@4201818eC6aMn0x3GY_9rw3ueb2ZWQ?nav=index.html|ChangeSet@-1d Created attachment 28198 [details] copyfromreadbuf-signedness.patch http://linux.bkbits.net:8080/linux-2.6/cset@420181322LZmhPTewcCOLkubGwOL3w?nav=index.html|ChangeSet@-1d Created attachment 28199 [details]
proc-read-signedness.patch
Created attachment 28200 [details]
reiserfs-signed.patch
Created attachment 28201 [details] fs-readwrite-signedness.patch http://linux.bkbits.net:8080/linux-2.6/cset@42026b11ti7KiDM_DMvBv5ZQH_3yLw?nav=index.html|ChangeSet@-1d Created attachment 28202 [details] always-accessok-checks.patch http://linux.bkbits.net:8080/linux-2.6/cset@4202616998ECZp5x5NfCDbX9JcEG7g?nav=index.html|ChangeSet@-1d Created attachment 28203 [details] verify-area-rename.patch http://linux.bkbits.net:8080/linux-2.6/cset@41f6cf91c1R7rbuggBVQLxBuD7m6Aw?nav=index.html|ChangeSet@-10d required before always-accessok-checks patch i think Created attachment 28204 [details] f-maxcount.patch http://linux.bkbits.net:8080/linux-2.6/cset@41f71cbbbAqnp67z79i7SSVQGtmQzg?nav=index.html|ChangeSet@-10d WILL BREAK BINARY COMPATIBILITY. We clearly can't take f-maxcount.patch, but if I'm reading things correctly, the other patches
should be sufficient to fix the known bugs.
I don't think we can take the verify-area-rename.patch (comment #10) without keeping
locks_verify_area for compatibility.
fs-readwrite-signedness.patch needs modification since we can't take the f-maxcount patch.
The reiserfs change looks correct to me.
Created attachment 28290 [details]
2.4-fsmaxcount-rwverifylock.patch
backport of f-maxcount and verify-area-rename patch to 2.4... just for the
record.
is public now. Summary was misleading I think. These issues are triggerable from userspace without the additional VFS protections which we cannot apply. Created attachment 28647 [details]
CAN-2005-0136_ia64-kernel.diff
Date: Mon, 21 Feb 2005 12:38:20 +0100 From: Thomas Biege <thomas@suse.de> To: Thomas Biege <thomas@suse.de> Subject: [joey@infodrom.org: [vendor-sec] Re: ia64 ptrace corner cases] User-Agent: Mutt/1.5.6i ----- Forwarded message from Martin Schulze <joey@infodrom.org> ----- From: Martin Schulze <joey@infodrom.org> To: Free Software Distribution Vendors <vendor-sec@lst.de> User-Agent: Mutt/1.5.6+20040907i Subject: [vendor-sec] Re: ia64 ptrace corner cases Errors-To: vendor-sec-admin@lst.de Date: Mon, 21 Feb 2005 09:33:07 +0100 I'm a bit confused about the status of these vulnerabilities in the IA-64 kernels: CVE Id type 2.4/patch 2.6/patch public? ------------------------------------------------------------------------- CAN-2005-0135 ia64/unwind ??? ??? CVE invisible CAN-2005-0136 ia64/ptrace vendor-sec vuln, [1] CVE invisible CAN-2005-0137 ia64/syscall vendor-sec non-vuln CVE invisible [1] http://lia64.bkbits.net:8080/linux-ia64-release-2.6.11/cset@41f2d1eePludGYyb1yOmGaW6Iois8Q Are all three treated as invisible even though the fix for CAN-2005-0136 is publically available? Regards, Joey the last comment should be somewhere else.... in https://bugzilla.innerweb.novell.com/show_bug.cgi?id=65236 yes. the patch too. ====================================================== Candidate: CAN-2005-0529 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0529 Reference: FULLDISC:20050215 linux kernel 2.6 fun. windoze is a joke Reference: URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846727602817&w=2 Reference: MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html Reference: CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@4201818eC6aMn0x3GY_9rw3ueb2ZW +Q Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context. ====================================================== Candidate: CAN-2005-0530 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0530 Reference: FULLDISC:20050215 linux kernel 2.6 fun. windoze is a joke Reference: URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846727602817&w=2 Reference: MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html Reference: CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@420181322LZmhPTewcCOLkubGwOL3+w Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument. ====================================================== Candidate: CAN-2005-0531 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0531 Reference: FULLDISC:20050215 linux kernel 2.6 fun. windoze is a joke Reference: URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846727602817&w=2 Reference: MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html Reference: CONFIRM:http://linux.bkbits.net:8080/linux-2.6/gnupatch@4208e1fcfccuD-eH2OGM5mBhi +hmQ3A The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments. ====================================================== Candidate: CAN-2005-0532 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0532 Reference: FULLDISC:20050215 linux kernel 2.6 fun. windoze is a joke Reference: URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846727602817&w=2 Reference: MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html Reference: CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@42018227TkNpHlX6BefnItV_GqMmz +Q The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data types. olaf to apply the first 2 patches, chris mason to apply the reiserfs patch. the infrastructure patvches will not be applied to older versions Added patches to SLES9 SP1, SP2, and SL_92 branches. HEAD is unaffected as these patches are in 2.6.11: - patches.fixes/n-tty-signedness: Fix sign checks in copy_from_read_buf() (65318). - patches.fixes/proc-read-signedness: Fix signed compare in fs/proc/generic.c::proc_file_read() (65318). Passing this bug to Chris for reiserfs reiserfs patches in SLES9 SP[12], and SL_92. Patches for HEAD were in 2.6.11. reopen foir tracking drivers/char/n_tty.c and fs/proc/generic.c are not affected in 2.4. (funny enough that this fault was introduced by introduction of the generic min() / min_t() macros in 2.6, instead of adding casts the people should have *THOUGHT* instead.) reiserfs does not have the function mentioned in 2.4, so not affected too. the others were new feature additions. updates and advisory released CVE-2005-0532: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P) |