[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: Linux Kernel: Missing access_ok() checks in IOCTL function (gpu/drm/i915 Driver)
From:       Timothy Michaud <tmm08a () acu ! edu>
Date:       2019-02-07 19:17:25
Message-ID: CAO5rKUP+mqC4fnOXHiNyo56EOPEBxDMPOoWmB_DH3yWh66e8WQ () mail ! gmail ! com
[Download RAW message or body]


Hi Ben,

I believe you're correct. (grsecurity agrees with you for what it's worth).
I've emailed mitre but have not heard back yet.

Cheers,

Tim M.

On Thu, Feb 7, 2019 at 12:13 PM Ben Hutchings <ben.hutchings@codethink.co.uk>
wrote:

> On Thu, 2019-01-24 at 10:30 +0100, Yves-Alexis Perez wrote:
> > On Wed, 2019-01-23 at 14:28 -0600, Timothy Michaud wrote:
> > > NOTE: I have requested a CVE identifier, and I'm sending this message,
> to
> > > make tracking of the fix easier; however, to avoid missing security
> fixes
> > > without CVE identifiers, you should *NOT* be cherry-picking a specific
> > > patch in response to a notification about a kernel security bug.
> > >
> > > Due to a lack of "access_ok()" checks in
> i915_gem_execbuffer2_ioctl[1], it
> > > is possible to escalate privileges similar to the waitid
> vulnerability[2]
> >
> > Hi, thanks for the report.
> >
> > The patch doesn't seem CC: stable, could you give us a status on the
> various
> > stable releases?
>
> Is there even a real security issue here?  So far as I can see,
> i915_gem_execbuffer2_ioctl() writes to a subset of the user memory
> range that it previously read using copy_from_user().  copy_from_user()
> does include the range check.
>
> Ben.
>
> --
> Ben Hutchings, Software Developer                         Codethink Ltd
> https://www.codethink.co.uk/                 Dale House, 35 Dale Street
>                                      Manchester, M1 2HF, United Kingdom
>


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic