[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE request: kernel: setup_arg_pages: diagnose
From: Josh Bressers <bressers () redhat ! com>
Date: 2010-10-22 14:33:39
Message-ID: 282104569.1470581287758019044.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]
Please use CVE-2010-3858
Thanks.
--
JB
----- "Eugene Teo" <eugene@redhat.com> wrote:
> "The CONFIG_STACK_GROWSDOWN variant of setup_arg_pages() does not
> check
> the size of the argument/environment area on the stack. When it is
> unworkably large, shift_arg_pages() hits its BUG_ON. This is
> exploitable
> with a very large RLIMIT_STACK limit, to create a crash pretty
> easily.
>
> Check that the initial stack is not too large to make it possible to
> map
> in any executable. We're not checking that the actual executable (or
>
> intepreter, for binfmt_elf) will fit. So those mappings might clobber
>
> part of the initial stack mapping. But that is just userland lossage
>
> that userland made happen, not a kernel problem."
>
> Upstream commit:
> http://git.kernel.org/linus/1b528181b2ffa14721fb28ad1bd539fe1732c583
>
> References:
> http://grsecurity.net/~spender/64bit_dos.c
> https://bugzilla.redhat.com/show_bug.cgi?id=645222
>
> Eugene
> --
> main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i);
> }
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic