Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4AFCFF1C.6090604@kernel.sg>
Date: Fri, 13 Nov 2009 14:39:24 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: bad permissions on megaraid_sas sysfs files

The megaraid_sas driver exposes a number of driver attributes in sysfs. 
Many of these are read-only, just export information from the driver and 
are world-readable.

A couple of attributes are writable and may be used to change the 
behaviour of the driver (e.g. setting debug logging levels, selecting 
poll vs. interrupt I/O mode etc).

Some of these writable attributes are mistakenly created with 
world-writable permissions, e.g. dbg_lvl and poll_mode_io.

This would allow an unprivileged user to affect kernel driver behaviour 
and logging level.

Upstream made the dbd_lvl permissions more restrictive:
http://git.kernel.org/linus/66dca9b8c50b5e59d3bea8b21cee5c6dae6c9c46

The poll_mode_io pseudofile still has world-writable permissions 
upstream. I'm getting my colleague to submit a patch.

https://bugzilla.redhat.com/show_bug.cgi?id=526068

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.