|
Message-Id: <20160917015114.28FD28BC7E7@smtpvmsrv1.mitre.org> Date: Fri, 16 Sep 2016 21:51:14 -0400 (EDT) From: cve-assign@...re.org To: marco.gra@...il.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: linux kernel SCSI arcmsr driver: buffer overflow in arcmsr_iop_message_xfer() -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > http://lxr.free-electrons.com/source/drivers/scsi/arcmsr/arcmsr_hba.c#L2399 > > the int32_t user_len is taken from the scsi command > > user_len = pcmdmessagefld->cmdmessage.Length; > > and used directly without sanitization in a memcpy to a heap buffer of > fixed size 1032 > > memcpy(ptmpuserbuffer, pcmdmessagefld->messagedatabuffer, user_len); > > potentially causing kernel heap corruption and arbitrary kernel code execution. > > The issue has been already acknowledged and patched in a development > branch: > http://marc.info/?l=linux-scsi&m=147394713328707&w=2 > http://marc.info/?l=linux-scsi&m=147394796228991&w=2 Use CVE-2016-7425. This is not yet available at http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/scsi/arcmsr/arcmsr_hba.c but may be there later. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJX3KBcAAoJEHb/MwWLVhi2PsAQAJiBt13fFrxXEIx2r4qo9M9A z/lQ08hVmRkuCtR3hUPz6qRiLR6k6iWMdzE4m0ic2Nwckggoiv3S1siYdE/lO2q9 ngVLJ3EgmchdCD/R13bSEMGA4RP4zMBAQCuf4m+7oOiMWiXhmUZiFgz3QEH1Uatw tRV+wJyTCkmTs3ooqXQW/JWXvs6kHxm5xY5qv3IGcMHNhMtpB19sRCLzFWIiSmxU T/VtuhLPRhtecxrZfHgyIumTNtbeycjm/zBfQ1/RRg5kDmGRGAC32hUN+zBYchyW NDlbveQqKhazRZ4tm7/HChH0Ah6ignen3GkyTMh8/ad69h/oEJ96TwLoBpxU+QL3 rKcb+I75TBB50ixD9cAaD1cOeYLvYGdtMRw+d30M6u5P0qSXMQsof8F2bgwIVH3g 9PiQFiSzJQeuXMxBpAJDsb0st4HiB0U7SeJYp1/eP0W4ojaZwBvcPqz84xoUPue8 XYlLde7OP7wIH+NW5ttpS0KmM8iGpcO5Sd0xB6fHo3Ms33SM4DP5PcNNgRjfky9R ixlOUFp28vrIWUFRmlexqEgvGNMUWhwJOemsV/y3629MuhfASay2+4+xs0AMKpKa tsIRk7hKjhgbl3iHJdAedXPbJT8wwuCbQXm6mU628BWire9smJKsYwIp+HAPVkU9 Q8bkubcBFrhLpuFa+/3b =bvH5 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.