oss-sec mailing list archives
Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open
From: Kurt Seifried <kseifried () redhat com>
Date: Fri, 13 Mar 2015 14:55:39 -0600
On 03/13/2015 01:46 PM, Greg KH wrote:
On Fri, Mar 13, 2015 at 11:30:23PM +0530, P J P wrote:Hello, Linux kernel built with the virtual console support(CONFIG_VT) is vulnerable to a NULL pointer dereference issue. It could occur while accessing pseudo terminal device(/dev/pts/*) files. An unprivileged user could use this flaw to crash the system kernel resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/c290f8358acaeffd8e0c551ddcc24d1206143376Digging up patches from 2011? Why? It should have long-ago been backported to all relevant kernel releases from any company that has a kernel that is still supported today that is older than the 3.2 release and newer than 2.6.28.
Because some Linux OS related companies provide software with API/ABI compatibility guarantees which results in a very long term back porting effort especially if the software is supported for 10-13 years. Also there's a large embedded market for Linux that is also interested in stability/being boring.
And if you are a company that is ignoring stable kernel patches for their old kernel releases, well, that's just not very wise :)
See the funny thing is we're not ignoring them. We're identifying and backporting the important ones, like security fixes. But as you know Kernel patch volume is quite high and not all patches are properly labelled as important or security by upstream, which leads to:
What does asking for a CVE for such an old issue help with?
So we can more easily identify the security related vulnerabilities and patches and provide updates for customers. This is why it's important to get CVE's onto security issues as soon as possible. Then we don't have a bunch of random/old issues to deal with at some point in the future. Aka why I unembargoed all our old cruft and cleaned house. #nomoresecretflaws
thanks, greg k-h
-- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- CVE request: Linux kernel: tty: kobject reference leakage in tty_open P J P (Mar 13)
- Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open Greg KH (Mar 13)
- Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open Kurt Seifried (Mar 13)
- Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open P J P (Mar 16)
- RE: CVE request: Linux kernel: tty: kobject reference leakage in tty_open Mehaffey, John (Mar 13)
- Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open cve-assign (Mar 13)
- Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open Greg KH (Mar 13)