|
|
Message-ID: <539D343E.5040105@ai2.upv.es>
Date: Sun, 15 Jun 2014 07:50:54 +0200
From: Salva Peiró <speiro@....upv.es>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE-2014-1739: Kernel Infoleak vulnerability in,media_enum_entities()
Hi,
We found an infoleak vulnerability in the ioctl media_enum_entities()
that allows to disclose 200 bytes the kernel process' stack.
The vulnerability is exploitable on versions up to linux-3.15-rc3 by
local users with read access to `/dev/media0`.
Linux distributions ship with `chmod 600 /dev/media0` preventing
unprivileged local users from exploiting the vulnerability.
However, some Android devices are known to be shipped with both read
and/or write permissions for all: chmod 666 /dev/media0.
A detailed analysis, proof of concept and fixes are at:
http://speirofr.appspot.com/cve-2014-1739-kernel-infoleak-vulnerability-in-media_enum_entities.html
This has been fixed in Linux Kernel commit:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6a623460e5fc960ac3ee9f946d3106233fd28d8
e6a623460e5fc960ac3ee9f946d3106233fd28d8
Author Salva Peiró <speiro@....upv.es>
Date Thu, 1 May 2014 12:53:28 +0000
Commit [media] media-device: fix infoleak in ioctl media_enum_entities()
This fixes CVE-2014-1739.
Signed-off-by: Salva Peiró <speiro@....upv.es>
Acked-by: Laurent Pinchart <laurent.pinchart@...asonboard.com>
Cc: stable@...r.kernel.org
Signed-off-by: Mauro Carvalho Chehab <m.chehab@...sung.com>
Salva Peiró
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.