Re: old buffer overflow in moxa driver

2007-05-02 Thread Andrew Morton
On Mon, 30 Apr 2007 16:48:29 -0600 dann frazier <[EMAIL PROTECTED]> wrote: > hey, > I noticed that the moxa input checking security bug described by > CVE-2005-0504 appears to remain unfixed upstream. > > The issue is described here: >

Re: old buffer overflow in moxa driver

2007-05-02 Thread Andrew Morton
On Mon, 30 Apr 2007 16:48:29 -0600 dann frazier [EMAIL PROTECTED] wrote: hey, I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504

Re: old buffer overflow in moxa driver

2007-05-01 Thread dann frazier
On Tue, May 01, 2007 at 04:29:27AM -0400, Andres Salomon wrote: > Right; the lack of input checking is most definitely a bug. It's no > longer a security issue, as a CAP_SYS_RAWIO check was added at some > point to the code path, but it's still a bug. I hadn't noticed this, but yes - the

Re: old buffer overflow in moxa driver

2007-05-01 Thread Jiri Slaby
On 5/1/07, Alan Cox <[EMAIL PROTECTED]> wrote: > > At the point you abuse these calls you can already just load arbitary > > data from userspace anyway. > > So the possible exploit will only work when run by root, is that what you > mean? If so isn't that still a security problem? To exploit

Re: old buffer overflow in moxa driver

2007-05-01 Thread Alan Cox
> > At the point you abuse these calls you can already just load arbitary > > data from userspace anyway. > > So the possible exploit will only work when run by root, is that what you > mean? If so isn't that still a security problem? To exploit the hole you need CAP_SYS_RAWIO which is the

Re: old buffer overflow in moxa driver

2007-05-01 Thread Andres Salomon
Jiri Slaby wrote: > Alan Cox napsal(a): >>> I noticed that the moxa input checking security bug described by >>> CVE-2005-0504 appears to remain unfixed upstream. >>> >>> The issue is described here: >>> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 >>> >>> Debian has been

Re: old buffer overflow in moxa driver

2007-05-01 Thread Jiri Slaby
Alan Cox napsal(a): >> I noticed that the moxa input checking security bug described by >> CVE-2005-0504 appears to remain unfixed upstream. >> >> The issue is described here: >> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 >> >> Debian has been shipping the following patch

Re: old buffer overflow in moxa driver

2007-05-01 Thread Jiri Slaby
Alan Cox napsal(a): I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 Debian has been shipping the following patch from Andres

Re: old buffer overflow in moxa driver

2007-05-01 Thread Andres Salomon
Jiri Slaby wrote: Alan Cox napsal(a): I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 Debian has been shipping the following

Re: old buffer overflow in moxa driver

2007-05-01 Thread Alan Cox
At the point you abuse these calls you can already just load arbitary data from userspace anyway. So the possible exploit will only work when run by root, is that what you mean? If so isn't that still a security problem? To exploit the hole you need CAP_SYS_RAWIO which is the highest

Re: old buffer overflow in moxa driver

2007-05-01 Thread Jiri Slaby
On 5/1/07, Alan Cox [EMAIL PROTECTED] wrote: At the point you abuse these calls you can already just load arbitary data from userspace anyway. So the possible exploit will only work when run by root, is that what you mean? If so isn't that still a security problem? To exploit the hole

Re: old buffer overflow in moxa driver

2007-05-01 Thread dann frazier
On Tue, May 01, 2007 at 04:29:27AM -0400, Andres Salomon wrote: Right; the lack of input checking is most definitely a bug. It's no longer a security issue, as a CAP_SYS_RAWIO check was added at some point to the code path, but it's still a bug. I hadn't noticed this, but yes - the

Re: old buffer overflow in moxa driver

2007-04-30 Thread Andres Salomon
Wow, I'd forgotten all about this one. Signed-off-by: Andres Salomon <[EMAIL PROTECTED]> dann frazier wrote: > hey, > I noticed that the moxa input checking security bug described by > CVE-2005-0504 appears to remain unfixed upstream. > > The issue is described here: >

Re: old buffer overflow in moxa driver

2007-04-30 Thread Ismail Dönmez
On Tuesday 01 May 2007 02:04:55 Alan Cox wrote: > > I noticed that the moxa input checking security bug described by > > CVE-2005-0504 appears to remain unfixed upstream. > > > > The issue is described here: > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 > > > > Debian has

Re: old buffer overflow in moxa driver

2007-04-30 Thread Alan Cox
> I noticed that the moxa input checking security bug described by > CVE-2005-0504 appears to remain unfixed upstream. > > The issue is described here: > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 > > Debian has been shipping the following patch from Andres Salomon. I >

old buffer overflow in moxa driver

2007-04-30 Thread dann frazier
hey, I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 Debian has been shipping the following patch from Andres Salomon. I tried

old buffer overflow in moxa driver

2007-04-30 Thread dann frazier
hey, I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 Debian has been shipping the following patch from Andres Salomon. I tried

Re: old buffer overflow in moxa driver

2007-04-30 Thread Alan Cox
I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 Debian has been shipping the following patch from Andres Salomon. I tried

Re: old buffer overflow in moxa driver

2007-04-30 Thread Ismail Dönmez
On Tuesday 01 May 2007 02:04:55 Alan Cox wrote: I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 Debian has been shipping the

Re: old buffer overflow in moxa driver

2007-04-30 Thread Andres Salomon
Wow, I'd forgotten all about this one. Signed-off-by: Andres Salomon [EMAIL PROTECTED] dann frazier wrote: hey, I noticed that the moxa input checking security bug described by CVE-2005-0504 appears to remain unfixed upstream. The issue is described here: