Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180706132655.GA1466@kroah.com>
Date: Fri, 6 Jul 2018 15:26:55 +0200
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: mmap vulnerability in motion eye video4linux
 driver for Sony Vaio PictureBook

On Fri, Jul 06, 2018 at 08:35:43PM +0800, zrlw@...a.com wrote:
> Hi all,i found a vulnerability in motion eye video4linux driver for Sony Vaio PictureBook,it desn't validate user-controlled parameter 'vma->vm_pgoff', a malicious process might access all of kernel memory from user space by trying pass different arbitrary address.
> /usr/src/linux-4.4.21-69/drivers/media/pci/meye/meye.c:
> static int meye_mmap(struct file *file, struct vm_area_struct *vma)
> ...        unsigned long offset = vma->vm_pgoff << PAGE_SHIFT;
> ...        pos = (unsigned long)meye.grab_fbuffer + offset;
>         while (size > 0) {
>                 page = vmalloc_to_pfn((void *)pos);
>                 if (remap_pfn_range(vma, start, page, PAGE_SIZE, PAGE_SHARED)) {...

Commit:
	be83bbf80682 ("mmap: introduce sane default mmap limits")
which was backported to all stable kernels, should have resolved this
problem, correct?

If not, please notify the media driver maintainers and they will be glad
to fix the problem.

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.