|
Message-ID: <Y12Bu2dSDbwtLoB3@itl-email>
Date: Sat, 29 Oct 2022 15:40:42 -0400
From: Demi Marie Obenour <demi@...isiblethingslab.com>
To: oss-security@...ts.openwall.com
Cc: Jisoo Jang <jisoo.jang@...sei.ac.kr>,
Minsuk Kang <linuxlovemin@...sei.ac.kr>
Subject: Re: CVE-2022-3628: A USB-accessible buffer overflow
in Linux kernel driver
On Sat, Oct 29, 2022 at 05:33:21PM +0900, Dokyung Song wrote:
> === Description ===
>
> An intra-object buffer overflow was found in brcmfmac (an upstream
> Broadcom's USB Wi-Fi driver), which can be triggered by a malicious USB
> device.
>
> As the object where the overflow could occur contains multiple function
> pointers (e.g., bus_reset.func), with knowledge of the code layout (i.e.,
> KASLR needs bypassing) the vulnerability could potentially be exploited by
> an attacker who controls USB messages. Without knowledge of the code
> layout, the consequence is a DoS.
Can this be exploited by means of e.g. partial function pointer
overwrites without having to bypass KASLR?
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.