|
Message-ID: <20130226175601.GA5984@dq>
Date: Tue, 26 Feb 2013 11:56:02 -0600
From: "Joshua J. Drake" <oss-sec-vfat@...p.org>
To: oss-security@...ts.openwall.com
Subject: CVE request - Linux kernel: VFAT slab-based buffer overflow
All,
I'd like to request a CVE for an issue leading to a buffer overflow of
a slab allocated buffer in the VFAT file system code. The issue
manifests when converting UTF8 characters to UTF16 inside the
"utf8s_to_utf16s" function. Reaching this code requires writing to a
VFAT partition that has been mounted with the "utf8" option. Ubuntu
10.04 mounts USB sticks with this option by default. Most Android
devices mount eMMC/SD cards/etc with this option.
The issue affects kernels prior to 3.2. Many Android devices remain
affected today.
I'm not entirely sure when the issue was introduced at this moment. It
appears to have been introduced here:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=74675a58507e769beee7d949dbed788af3c4139d
The issue was fixed here:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
The issue was partially disclosed here (this spurred my investigation):
http://www.exploit-db.com/exploits/23248/
Props to G13 for finding it. It's pretty disappointing that
Google/Android security teams (and of course Linux maintainers) didn't
responsibly disclose the issue so other Linux kernel packagers could
package a fix.
If anyone wishes to contact me off-list with questions or concerns,
feel free.
Thanks,
Joshua J. Drake
jduck
Download attachment "signature.asc" of type "application/pgp-signature" (191 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.