[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: kernel: /sys/kernel/debug/acpi/custom_method
From:       Eugene Teo <eugene () redhat ! com>
Date:       2011-02-25 1:03:49
Message-ID: 4D66FFF5.5030703 () redhat ! com
[Download RAW message or body]

On 02/25/2011 08:32 AM, Kees Cook wrote:
> Hi,
>
> While CVE-2010-4347 covers the unprivileged to fully privileged escalation
> issue, this interface still allows an unprivileged root user to gain
> back all their capabilities.
>
> Having a system with acpi and debugfs built into the kernel allows
> a uid=0 user (without capabilities, e.g. in containers) to write to
> arbitrary kernel memory, likely resulting in escalated capability
> privileges[1], or unlocking an otherwise modules-disabled kernel by
> changing /proc/sys/kernel/modules_disabled back to 0.

Use CVE-2011-1021.

Eugene
-- 
Eugene Teo / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic