[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] Linux Kernel: Missing access_ok() checks in IOCTL function (gpu/drm/i915 Driver)
From:       Yves-Alexis Perez <corsac () debian ! org>
Date:       2019-01-24 9:30:28
Message-ID: e04349fc26ad12ba9a8d3b74848b42c88bba5dc3.camel () debian ! org
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Wed, 2019-01-23 at 14:28 -0600, Timothy Michaud wrote:
> NOTE: I have requested a CVE identifier, and I'm sending this message, to
> make tracking of the fix easier; however, to avoid missing security fixes
> without CVE identifiers, you should *NOT* be cherry-picking a specific
> patch in response to a notification about a kernel security bug.
> 
> Due to a lack of "access_ok()" checks in i915_gem_execbuffer2_ioctl[1], it
> is possible to escalate privileges similar to the waitid vulnerability[2]

Hi, thanks for the report.

The patch doesn't seem CC: stable, could you give us a status on the various
stable releases?

Regards,
- -- 
Yves-Alexis
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlxJhbQACgkQ3rYcyPpX
RFsNSwf/WQH9UPK9YIFBdu47hZUKOr2tRkFosjnyEecG8HsBxI1191fXsZcGgeJk
YVzL+oWvlvQcTajPnbBLPU6qey9ZFz8AdNkXGSKXnejaPpn9LvkJntT086s6lX1i
dWSgDbhAX0PT2UO1I1k4GJ5KA8SxEIzPnqq2moB8WjcIIWuqFEFJIjYkL36Wovhp
/rKIBZGMX25zxKHzCckGYcski/KKFpgqbqbyQ2jLydht3nHczlhGP/lTa/DVr8IN
YH//6ayr0Kml/G9X8ZIV1ciu+UKQGFAVwrXNAmugNmy6tZwRVDezvP2+JfWZNAG/
bjhyac/xqmS/VquQjKKgyTQPoPBUkg==
=Xt1Y
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic