Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220422070546.GD7624@suse.de>
Date: Fri, 22 Apr 2022 09:05:50 +0200
From: Marcus Meissner <meissner@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2022-1419: Linux kernel: A concurrency
 use-after-free in vgem_gem_dumb_create

On Thu, Apr 21, 2022 at 07:35:46PM +0200, Greg KH wrote:
> On Thu, Apr 21, 2022 at 11:44:54PM +0800, Minh Yuan wrote:
> > Timeline:
> > * 21.04.22 - Vulnerability reported to security@...nel.org and
> > linux-distros@...openwall.org
> > * 21.04.22 - CVE-2022-1419 assigned.
> 
> Why are people assigning CVEs to things that require root permissions?
> Or are there distros running on kernels older than 5.4 that allow
> untrusted users access to the drm ioctls directly?
> 
> I'm curious as it would affect the backporting of the needed fixes here
> (or not.)

It does not, distros like SUSE give out ACLs or groups write perms to /dev/dri/card0
to it via udev.

crw-rw----+ 1 root video 226, 0 Apr 22 08:47 /dev/dri/card0

getfacl /dev/dri/card0

# file: dev/dri/card0
# owner: root
# group: video
user::rw-
user:marcus:rw-
group::rw-
mask::rw-
other::---

Ciao, Marcus

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.