Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.10.1308141725010.17107@vincent-weaver-1.um.maine.edu>
Date: Wed, 14 Aug 2013 17:37:32 -0400 (EDT)
From: Vince Weaver <vincent.weaver@...ne.edu>
To: oss-security@...ts.openwall.com
Subject: CVE Request: linux-kernel priviledge escalation on ARM/perf

Hello

I'm not really a security researcher, so hopefully I'm reporting this in 
the proper way.

I have a fuzzer tool for the perf_event_open() syscall that found
a few oopses on the ARM platform, which I reported to lkml a week ago.

One of the oopses can lead to a local privilege escalation on ARM-perf.
This fix can be found here:
  http://www.arm.linux.org.uk/developer/patches/viewpatch.php?id=7809/1
The discussion thread is:
  https://lkml.org/lkml/2013/8/7/259 

The hope is this appears in 3.11-rc6 but my attempts to get the people at 
security@...r.kernel.org to take this seriously didn't really go very 
well.

I do have code that will exploit the kernel and give me a root shell
on an ARM Pandaboard machine running 3.11-rc4.  The exploit is a bit 
fragile though:
  + Only works on ARM
  + Elevates from normal user to root, no special config required.
    perf_event syscalls run as regular users, not sure why some
    think you need root.
  + It does need a user-mappable address at an exact byte offset
    from a pmu_struct in memory.  This limits things somewhat; in
    my testing 3.11-rc kernels have INT_MIN at exactly the right place 
    but the exploit doesn't work on a 3.7.6 kernel,
    it just oopses or crashes the machine.

Thanks,

Vince

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.