Bug 8028
Summary: | capi_{cmsg,message}2str not thread-safe; vulnerable to buffer overflow | ||
---|---|---|---|
Product: | Drivers | Reporter: | Ben Hutchings (ben-public-nospam) |
Component: | ISDN | Assignee: | Karsten Keil (kernel) |
Status: | RESOLVED CODE_FIX | ||
Severity: | high | ||
Priority: | P2 | ||
Hardware: | i386 | ||
OS: | Linux | ||
Kernel Version: | 2.6.20 | Subsystem: | |
Regression: | --- | Bisected commit-id: | |
Attachments: | patch proposal |
Description
Ben Hutchings
2007-02-17 13:02:58 UTC
The Debian bug report for the kernel is now http://bugs.debian.org/411294 Note: this code was never for production use, it only was some helper to debug CAPI applications, but you are correct this should be fixed. It can be overflowed by a single evil message from a local source, but not via the ISDN network.Here is a patch (2.6.20 based) to solve this. Created attachment 10526 [details]
patch proposal
The patch fix two issues:
- fix possible string overflows (grows buffer or return error)
- allows concurrent access to these functions
It also allows to disable the CAPI trace feature completely (e.g. for low
memory embedded systems).
Patch is in 2.6.21-rc2-git2 now. |