LKML Archive on lore.kernel.org
help / color / mirror / Atom feed
* {2.6.22.y} CVE-2007-6434
@ 2008-02-04 20:13 Oliver Pinter
2008-02-04 20:14 ` Oliver Pinter
` (2 more replies)
0 siblings, 3 replies; 6+ messages in thread
From: Oliver Pinter @ 2008-02-04 20:13 UTC (permalink / raw)
To: stable
Cc: linux-kernel, chrisw, Greg KH, Willy Tarreau, Adrian Bunk, Nick Piggin
mainline: ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
--->8---
commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
Author: Eric Paris <eparis@redhat.com>
Date: Tue Dec 4 23:45:31 2007 -0800
VM/Security: add security hook to do_brk
Given a specifically crafted binary do_brk() can be used to get low pages
available in userspace virtual memory and can thus be used to circumvent
the mmap_min_addr low memory protection. Add security checks in do_brk().
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Alan Cox <alan@redhat.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Cc: James Morris <jmorris@namei.org>
Cc: Chris Wright <chrisw@sous-sol.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
diff --git a/mm/mmap.c b/mm/mmap.c
index facc1a7..acfc13f 100644
--- a/mm/mmap.c
+++ b/mm/mmap.c
@@ -1934,6 +1934,10 @@ unsigned long do_brk(unsigned long addr, unsigned long le
if (is_hugepage_only_range(mm, addr, len))
return -EINVAL;
+ error = security_file_mmap(0, 0, 0, 0, addr, 1);
+ if (error)
+ return error;
+
flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags;
error = arch_mmap_check(addr, len, flags);
---8<---
--
Thanks,
Oliver
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: {2.6.22.y} CVE-2007-6434
2008-02-04 20:13 {2.6.22.y} CVE-2007-6434 Oliver Pinter
@ 2008-02-04 20:14 ` Oliver Pinter
2008-02-04 21:02 ` Oliver Pinter
2008-02-04 21:34 ` Chris Wright
2 siblings, 0 replies; 6+ messages in thread
From: Oliver Pinter @ 2008-02-04 20:14 UTC (permalink / raw)
To: stable
Cc: linux-kernel, chrisw, Greg KH, Willy Tarreau, Adrian Bunk, Nick Piggin
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6434
On 2/4/08, Oliver Pinter <oliver.pntr@gmail.com> wrote:
> mainline: ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
>
> --->8---
> commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
> Author: Eric Paris <eparis@redhat.com>
> Date: Tue Dec 4 23:45:31 2007 -0800
>
> VM/Security: add security hook to do_brk
>
> Given a specifically crafted binary do_brk() can be used to get low
> pages
> available in userspace virtual memory and can thus be used to circumvent
> the mmap_min_addr low memory protection. Add security checks in
> do_brk().
>
> Signed-off-by: Eric Paris <eparis@redhat.com>
> Acked-by: Alan Cox <alan@redhat.com>
> Cc: Stephen Smalley <sds@tycho.nsa.gov>
> Cc: James Morris <jmorris@namei.org>
> Cc: Chris Wright <chrisw@sous-sol.org>
> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
>
> diff --git a/mm/mmap.c b/mm/mmap.c
> index facc1a7..acfc13f 100644
> --- a/mm/mmap.c
> +++ b/mm/mmap.c
> @@ -1934,6 +1934,10 @@ unsigned long do_brk(unsigned long addr, unsigned
> long le
> if (is_hugepage_only_range(mm, addr, len))
> return -EINVAL;
>
> + error = security_file_mmap(0, 0, 0, 0, addr, 1);
> + if (error)
> + return error;
> +
> flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags;
>
> error = arch_mmap_check(addr, len, flags);
> ---8<---
> --
> Thanks,
> Oliver
>
--
Thanks,
Oliver
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: {2.6.22.y} CVE-2007-6434
2008-02-04 20:13 {2.6.22.y} CVE-2007-6434 Oliver Pinter
2008-02-04 20:14 ` Oliver Pinter
@ 2008-02-04 21:02 ` Oliver Pinter
2008-02-04 21:38 ` Greg KH
2008-02-04 21:34 ` Chris Wright
2 siblings, 1 reply; 6+ messages in thread
From: Oliver Pinter @ 2008-02-04 21:02 UTC (permalink / raw)
To: stable
Cc: linux-kernel, chrisw, Greg KH, Willy Tarreau, Adrian Bunk, Nick Piggin
sorry, drop this ..
/usr/data/source/oliver/build/linux-2.6.22.y-rcX-stable/mm/mmap.c: In
function 'do_brk':
/usr/data/source/oliver/build/linux-2.6.22.y-rcX-stable/mm/mmap.c:1889:
error: too many arguments to function 'security_file_mmap'
make[6]: *** [mm/mmap.o] Error 1
make[5]: *** [mm] Error 2
On 2/4/08, Oliver Pinter <oliver.pntr@gmail.com> wrote:
> mainline: ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
>
> --->8---
> commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
> Author: Eric Paris <eparis@redhat.com>
> Date: Tue Dec 4 23:45:31 2007 -0800
>
> VM/Security: add security hook to do_brk
>
> Given a specifically crafted binary do_brk() can be used to get low
> pages
> available in userspace virtual memory and can thus be used to circumvent
> the mmap_min_addr low memory protection. Add security checks in
> do_brk().
>
> Signed-off-by: Eric Paris <eparis@redhat.com>
> Acked-by: Alan Cox <alan@redhat.com>
> Cc: Stephen Smalley <sds@tycho.nsa.gov>
> Cc: James Morris <jmorris@namei.org>
> Cc: Chris Wright <chrisw@sous-sol.org>
> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
>
> diff --git a/mm/mmap.c b/mm/mmap.c
> index facc1a7..acfc13f 100644
> --- a/mm/mmap.c
> +++ b/mm/mmap.c
> @@ -1934,6 +1934,10 @@ unsigned long do_brk(unsigned long addr, unsigned
> long le
> if (is_hugepage_only_range(mm, addr, len))
> return -EINVAL;
>
> + error = security_file_mmap(0, 0, 0, 0, addr, 1);
> + if (error)
> + return error;
> +
> flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags;
>
> error = arch_mmap_check(addr, len, flags);
> ---8<---
> --
> Thanks,
> Oliver
>
--
Thanks,
Oliver
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: {2.6.22.y} CVE-2007-6434
2008-02-04 20:13 {2.6.22.y} CVE-2007-6434 Oliver Pinter
2008-02-04 20:14 ` Oliver Pinter
2008-02-04 21:02 ` Oliver Pinter
@ 2008-02-04 21:34 ` Chris Wright
2008-02-04 21:36 ` Oliver Pinter
2 siblings, 1 reply; 6+ messages in thread
From: Chris Wright @ 2008-02-04 21:34 UTC (permalink / raw)
To: Oliver Pinter
Cc: stable, linux-kernel, chrisw, Greg KH, Willy Tarreau,
Adrian Bunk, Nick Piggin
* Oliver Pinter (oliver.pntr@gmail.com) wrote:
> mainline: ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
>
> --->8---
> commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
> Author: Eric Paris <eparis@redhat.com>
> Date: Tue Dec 4 23:45:31 2007 -0800
>
> VM/Security: add security hook to do_brk
>
> Given a specifically crafted binary do_brk() can be used to get low pages
> available in userspace virtual memory and can thus be used to circumvent
> the mmap_min_addr low memory protection. Add security checks in do_brk().
All of the low mmap addr stuff isn't added until 2.6.23.
thanks,
-chris
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: {2.6.22.y} CVE-2007-6434
2008-02-04 21:34 ` Chris Wright
@ 2008-02-04 21:36 ` Oliver Pinter
0 siblings, 0 replies; 6+ messages in thread
From: Oliver Pinter @ 2008-02-04 21:36 UTC (permalink / raw)
To: Chris Wright
Cc: stable, linux-kernel, Greg KH, Willy Tarreau, Adrian Bunk, Nick Piggin
ok, thanks
On 2/4/08, Chris Wright <chrisw@sous-sol.org> wrote:
> * Oliver Pinter (oliver.pntr@gmail.com) wrote:
> > mainline: ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
> >
> > --->8---
> > commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
> > Author: Eric Paris <eparis@redhat.com>
> > Date: Tue Dec 4 23:45:31 2007 -0800
> >
> > VM/Security: add security hook to do_brk
> >
> > Given a specifically crafted binary do_brk() can be used to get low
> pages
> > available in userspace virtual memory and can thus be used to
> circumvent
> > the mmap_min_addr low memory protection. Add security checks in
> do_brk().
>
> All of the low mmap addr stuff isn't added until 2.6.23.
>
> thanks,
> -chris
>
--
Thanks,
Oliver
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: {2.6.22.y} CVE-2007-6434
2008-02-04 21:02 ` Oliver Pinter
@ 2008-02-04 21:38 ` Greg KH
0 siblings, 0 replies; 6+ messages in thread
From: Greg KH @ 2008-02-04 21:38 UTC (permalink / raw)
To: Oliver Pinter
Cc: stable, linux-kernel, chrisw, Willy Tarreau, Adrian Bunk, Nick Piggin
On Mon, Feb 04, 2008 at 10:02:03PM +0100, Oliver Pinter wrote:
> sorry, drop this ..
>
>
> /usr/data/source/oliver/build/linux-2.6.22.y-rcX-stable/mm/mmap.c: In
> function 'do_brk':
> /usr/data/source/oliver/build/linux-2.6.22.y-rcX-stable/mm/mmap.c:1889:
> error: too many arguments to function 'security_file_mmap'
> make[6]: *** [mm/mmap.o] Error 1
> make[5]: *** [mm] Error 2
Please at least build test your patches before you send them to us...
:)
thanks,
greg k-h
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2008-02-04 22:05 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2008-02-04 20:13 {2.6.22.y} CVE-2007-6434 Oliver Pinter
2008-02-04 20:14 ` Oliver Pinter
2008-02-04 21:02 ` Oliver Pinter
2008-02-04 21:38 ` Greg KH
2008-02-04 21:34 ` Chris Wright
2008-02-04 21:36 ` Oliver Pinter
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).