Date: Mon, 28 Feb 2011 15:53:44 -0500 (EST) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE request: v86d: Failure to validate netlink message sender Please use CVE-2011-1070 Thanks. -- JB ----- Original Message ----- > Versions of the v86d userspace helper for the Linux uvesafb driver > before 0.1.10 did not verify that received netlink messages were sent > by the kernel, allowing unprivileged users to manipulate the video > mode and potentially other consequences. > > v86d executes video BIOS code with access to /dev/mem in response to > netlink messages, using either vm86 mode or an x86 emulator, depending > on configuration. I an unclear on whether it is possible to e.g. crash > the machine or escalate privileges by spoofing requests, or only to > mess with the video card. > > References: > http://repo.or.cz/w/v86d.git/commit/f9abfd412639286c3143e93e8ba2c9598dfba640
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ