public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Marcelo Tosatti <marcelo.tosatti@cyclades.com>
To: Willy Tarreau <willy@w.ods.org>
Cc: linux-kernel@vger.kernel.org, julien@cr0.org
Subject: Re: Linux-2.4.30-hf3
Date: Mon, 30 May 2005 08:24:49 -0300	[thread overview]
Message-ID: <20050530112449.GA5046@logos.cnet> (raw)
In-Reply-To: <20050530050746.GK18600@alpha.home.local>

On Mon, May 30, 2005 at 07:07:46AM +0200, Willy Tarreau wrote:
> Hi again,
> 
> Julien corrected me on the points below :
> 
> >   - a NULL dereference in serial.c found by Julien Tinnes which could lead
> >     to an oops.
> 
> Could possibly be exploited by mapping the first page of a program and
> watching the kernel eat the data instead of oopsing.

Huh? I fail to see how that one is exploitable, given that no in-tree callers 
should pass "tty" as NULL to any of the affected functions (that is impossible, 
AFAICS).

No? Julien?

> >   - an off-by-one in mtrr.c found by Brad Spengler and reported by J.Tinnes
> >     which could lead to a panic.
> 
> This is inexact. I've checked several other archs :
>  - sparc, sparc64, x86_64, alpha, mips all assume that (n) is unsigned and
>    will overflow, possibly executing user-controlled code.
>  - ppc and ppc64 explicitly check that (n) is < TASK_SIZE and should be safe.

You refer to copy_from_user() right?  I suppose so, because there's no mtrr 
outside i386.

>  - x86 will BUG_ON((long)n < 0) (=> oops/panic).
>  - others not checked. 

Well, it requires root priveledges:

+    if (!len) return -EINVAL;
     if ( !suser () ) return -EPERM;   <---------------

So, its "safe".

> >   - a few unchecked strcpy() in ipvs fixed in PaX which I'm not absolutely
> >     sure are exploitable, but are definitely dirty and risky.
> 
> They are exploitable by anyone with enough privilege to manipulate IPVS.
> Think of a user front-end for example.

Ok. Great Willy!

  reply	other threads:[~2005-05-30 16:07 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-05-29 22:37 Linux-2.4.30-hf3 Willy Tarreau
2005-05-30  5:07 ` Linux-2.4.30-hf3 Willy Tarreau
2005-05-30 11:24   ` Marcelo Tosatti [this message]
2005-05-30 18:00     ` Linux-2.4.30-hf3 Julien TINNES

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050530112449.GA5046@logos.cnet \
    --to=marcelo.tosatti@cyclades.com \
    --cc=julien@cr0.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=willy@w.ods.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox