|
Message-ID: <20150502134014.GA8226@openwall.com> Date: Sat, 2 May 2015 16:40:14 +0300 From: Solar Designer <solar@...nwall.com> To: Wen Xu <hotdog3645@...il.com> Cc: oss-security@...ts.openwall.com, Vasily Kulikov <segoon@...nwall.com> Subject: Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam On Sat, May 02, 2015 at 09:18:23PM +0800, Wen Xu wrote: > Really sorry, what you said is all right. Actually we've successfully seen > the potential that we can take advantage of this bug to achieve privilege > escalation (root) on android (both 32bit/64bit)(>=4.3), even on android > 64bit, the list poison value is 0x200200 which can be mapped ;) That's why > we think this vulnerability is high-threat. Oh, so Android 4.3+ enables ping sockets for all apps by default? I have mixed feelings about that. > For linux PC, the normal user > does not have the privilege to create a icmp(ping) socket, I agree with > your analysis including on PC, the dead value is 0xdead000000000000. And > also it does not exist in some versions and distributions, I write the mail > in a hurry and do not explain it in detail ;) Sorry for my mistakes again. I found no mistakes on your part - just too brief a message requiring further analysis to determine actual impact of the bug. The bug does exist in all currently supported upstream kernel versions, as you say, even if its security relevance varies from none to full local privesc across archs and distros. > So as you said MITRE could give us a CVE ID? That's nice, so where could I > get informed when it is given? ;) I expect they will post to oss-security. Just give them some days. So, who's to post a patch to LKML to adjust default LIST_POISON*? Vasily? Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.