Bug 54680 (CVE-2004-0535) - VUL-0: CVE-2004-0535: info leak in e1000 network driver
Summary: VUL-0: CVE-2004-0535: info leak in e1000 network driver
Status: RESOLVED FIXED
Alias: CVE-2004-0535
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Thomas Biege
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2004-0535: CVSS v2 Base Score: 2....
Keywords:
Depends on:
Blocks:
 
Reported: 2004-04-30 19:47 UTC by Sebastian Krahmer
Modified: 2021-10-20 15:41 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2004-04-30 19:47:31 UTC
Date: Wed, 28 Apr 2004 14:44:15 -0700
From: Chris Wright <chrisw@osdl.org>
To: vendor-sec@lst.de
Subject: Re: [vendor-sec] [hmh@debian.org: Re: kernel security problems
    again?]

* Matt Zimmerman (mdz@debian.org) wrote:
> Does anyone have details about these?  Are there genuine vulnerabilities
> here?

I'd say the e1000 is the worst of the bunch.
> ----- Forwarded message from Henrique de Moraes Holschuh <hmh@debian.org>
-----
> 
> Date: Fri, 23 Apr 2004 10:50:58 -0300
> From: Henrique de Moraes Holschuh <hmh@debian.org>
> Resent-From: debian-security@lists.debian.org
> To: debian-security@lists.debian.org
> Subject: Re: kernel security problems again?
> 
> On Fri, 23 Apr 2004, Giacomo Mulas wrote:
> >     * Fix potential memory leak in devpts

This is small leak during a mount, which seems like a small issue, but
if you're fixing things up...

> >     * Fix potential memory access to free memory in /proc handling

I don't recall if it's easily trigered.  Fix is trivial, so, again, if
you're fixing things up...

> There is also:
>       * e1000: fix probable security hole

This hole allows reading kernel memory.  The patch (2.6, but should
be same against 2.4) is below:

thanks,
-chris
-- 
Linux Security Modules     http://lsm.immunix.org     http://lsm.bkbits.net

===== drivers/net/e1000/e1000_ethtool.c 1.42 vs edited =====
--- 1.42/drivers/net/e1000/e1000_ethtool.c     Fri Apr  9 16:39:34 2004
+++ edited/drivers/net/e1000/e1000_ethtool.c   Fri Apr 16 11:20:03 2004
@@ -1514,6 +1514,9 @@
 
       if(copy_from_user(&regs, addr, sizeof(regs)))

       return -EFAULT;
+      memset(regs_buff, 0, sizeof(regs_buff));
+      if (regs.len > E1000_REGS_LEN)
+      regs.len = E1000_REGS_LEN;
       e1000_ethtool_gregs(adapter, &regs, regs_buff);
       if(copy_to_user(addr, &regs, sizeof(regs)))
       return -EFAULT;


Should be something for STABLE.
Comment 1 Sebastian Krahmer 2004-04-30 19:47:31 UTC
<!-- SBZ_reproduce  -->
...
Comment 2 Hubert Mantel 2004-04-30 22:41:35 UTC
JFYI: Current SLS9 kernel already has the fix.
Comment 3 Hubert Mantel 2004-05-28 22:34:40 UTC
Fix is in all our trees now. Re-assigning.
Comment 4 Marcus Meissner 2004-06-03 19:13:18 UTC
this issue is public, right? 
Comment 5 Thomas Biege 2004-06-03 22:26:53 UTC
Sebastian knows more about it. He will be back tomorrow. 
Comment 6 Thomas Biege 2004-06-04 16:15:05 UTC
CAN-2004-0535 
 
Marcus, it's public! :) 
Comment 7 Thomas Biege 2004-07-14 17:54:27 UTC
packages were approved 
Comment 8 Thomas Biege 2009-10-13 20:21:25 UTC
CVE-2004-0535: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)