Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0812162121230.5724@faron.mitre.org>
Date: Tue, 16 Dec 2008 21:24:32 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: Eugene Teo <eugeneteo@...nel.sg>
cc: "Steven M. Christey" <coley@...us.mitre.org>,
        oss-security@...ts.openwall.com
Subject: Re: CVE request: kernel: applicom: fix an unchecked user ioctl range


On Wed, 17 Dec 2008, Eugene Teo wrote:

> Hmm, there's a comment in the ac_ioctl() that the device for this is
> only accessible by root, so if out of range may not matter. Hmm. So,
> maybe, maybe not.

Our current approach would be, probably not.

We're probably going to see an increase in issues related to IOCTLs
(simply because we're seeing an increase in CVE, mostly in Windows
software so far).  So the accessibility of the IOCTL matters - in some
cases, maybe the IOCTL shouldn't be exposed to anybody untrusted at all
(maybe you're listening on a socket that allows anyone to connect).  In
other cases, maybe it can accept requests from untrusted users but then
has to validate its inputs, like we're seeing with userland-to-kernel
interfaces.

- Steve

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.