Bug 353207 (CVE-2008-0007) - VUL-0: CVE-2008-0007: kernel: insufficient range checks of certain fault handlers
Summary: VUL-0: CVE-2008-0007: kernel: insufficient range checks of certain fault hand...
Status: RESOLVED FIXED
Alias: CVE-2008-0007
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Major
Target Milestone: unspecified
Deadline: 2008-02-11
Assignee: Nick Piggin
QA Contact: Security Team bot
URL:
Whiteboard: wasL3:30844 kernel:10.2,sles10sp1,sle...
Keywords: DSLA_REQUIRED, DSLA_SOLUTION_PROVIDED
Depends on:
Blocks:
 
Reported: 2008-01-11 10:24 UTC by Ludwig Nussel
Modified: 2020-04-21 09:48 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority: 800
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
original mail, includes patch (9.81 KB, patch)
2008-01-11 10:25 UTC, Ludwig Nussel
Details | Diff
SLES9 SP4 audit (4.12 KB, patch)
2008-01-18 13:04 UTC, Nick Piggin
Details | Diff
SLES10 SP1 audit (8.03 KB, patch)
2008-01-18 13:05 UTC, Nick Piggin
Details | Diff
SLES10 SP2 audit (8.03 KB, patch)
2008-01-18 13:06 UTC, Nick Piggin
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Ludwig Nussel 2008-01-11 10:24:39 UTC
This issue is not public yet, please keep any information about it inside SUSE.

Nick Piggin discovered problems with range checks of certain fault handlers

---
Drivers that register a ->fault handler, that does not range-check its offset
argument, must set VM_DONTEXPAND in the vm_flags in order to prevent an
expanding mremap from overflowing the resource (and potentially causing a
kernel crash or access to sesitive data).
---
Comment 1 Ludwig Nussel 2008-01-11 10:25:57 UTC
Created attachment 190236 [details]
original mail, includes patch
Comment 2 Ludwig Nussel 2008-01-16 08:49:44 UTC
CVE-2008-0007
Comment 3 Marcus Meissner 2008-01-17 10:47:37 UTC
Nick, did you get any additional feedback?

Do you think we can incliude the patches into the next round of updates?
Comment 4 Nick Piggin 2008-01-17 19:42:43 UTC
No additional feedback, although I think it is quite conclusive that it is a security bug.

The patches are mostly quite trivial, so yes I think we should include them into the next round of updates. I'll try to have patches for SLES9_SP4, SLES10_SP1 and SLES10_SP2 before the weekend.

Do I also need to consider the opensuse branches? Can you give me an idea of which ones? Thanks.
Comment 5 Marcus Meissner 2008-01-17 19:46:20 UTC
yes, the opensuse ones also need to be considered

active at this time are just two:
SL102_BRANCH
SL103_BRANCH
(10.1 uses SLES10 SP1 branch)

Did security@kernel.org answer somehow?
Comment 6 Nick Piggin 2008-01-18 13:03:35 UTC
OK, I have made patches for SLES9 SP4, SLES10 SP1 and SP2 so far. Attaching now for comments. SL patches will follow tomorrow...

Lars, can the SLES9 patch be merged before the next update kernel do you think? 
Comment 7 Nick Piggin 2008-01-18 13:04:52 UTC
Created attachment 190990 [details]
SLES9 SP4 audit
Comment 8 Nick Piggin 2008-01-18 13:05:37 UTC
Created attachment 190991 [details]
SLES10 SP1 audit
Comment 9 Nick Piggin 2008-01-18 13:06:44 UTC
Created attachment 190992 [details]
SLES10 SP2 audit
Comment 10 Nick Piggin 2008-01-18 13:11:13 UTC
(In reply to comment #5 from Marcus Meissner)

> Did security@kernel.org answer somehow?
> 

And to answer this question: no, nobody from security@kernel.org answered.
Comment 11 Marcus Meissner 2008-01-18 13:13:40 UTC
i would just suggest to push the stuff to mainline then (please include the CVE-2008-0007 id), so it gets upstream review and inclusion
Comment 12 Lars Marowsky-Bree 2008-01-18 13:29:40 UTC
Yes, please merge into SP4.
Comment 13 Nick Piggin 2008-01-21 03:33:59 UTC
(In reply to comment #11 from Marcus Meissner)
> i would just suggest to push the stuff to mainline then (please include the
> CVE-2008-0007 id), so it gets upstream review and inclusion
> 

I will push it upstream, although it previously has had (private) review by all maintainers who's code is touched, as well as some core mm developers and also Linus. And it is agreed that this is a security vulnerability and the patch will fix.

So I will commit to all SUSE branches soon.

When sending out a public changelog for the patch, is there any sort of non disclosure period where I am supposed to avoid describing details of the bug?
Comment 14 Nick Piggin 2008-01-21 06:38:38 UTC
OK, committed as patches.fixes/nopage-range-fix.patch to all the 5 SLES and SL branches. Some branches also have some broken out incremental patches for their xen series.

Comment 15 Marcus Meissner 2008-01-21 08:10:20 UTC
hmm.

so there were reactions and good feedback. Good to hear! :)

Since you found the patch you would coordinate the disclosure together with security@kernel.org.

I think doing a disclosure delay is not really necessary (and would be too confused), so I would suggest not doing any further delay and go ahead with inclusion.
Comment 16 Nick Piggin 2008-01-21 08:36:59 UTC
OK, thanks for all the guidance. I think it makes sense to send it upstream without delay, agreed.

I will resend the patch and request inclusion upstream.
Comment 17 Greg Kroah-Hartman 2008-02-06 21:42:04 UTC
Checked into the 10.3 tree.

I'll reassign it to Nick to have him handle it for any other kernel trees that are affected.
Comment 18 Marcus Meissner 2008-05-23 14:01:30 UTC
Nick? did we get it in all branches?
Comment 19 Nick Piggin 2008-06-16 04:48:50 UTC
SLES10 SP1/2
SLES9 SP4
SL102/3

As far as I know, that's all that needs to be checked in? The patches are upstream, so SL11 based kernels should all be covered.
Comment 20 Marcus Meissner 2008-06-16 08:26:37 UTC
SL102_BRANCH
SL103_BRANCH

got it too as far as I can see (we fix security issues also for openSUSE kernels).

all looks good, thanks!
Comment 21 Marcus Meissner 2008-06-24 09:26:44 UTC
released sles9 updates kernel version is: 2.6.5-7.312
Comment 22 Thomas Biege 2009-10-14 00:44:37 UTC
CVE-2008-0007: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)