Bug 377591 (CVE-2007-5908)

Summary: CVE-2007-5908 Buffer overflow in the (1) sysfs_show_available_clocksources and (2) sysfs_show_current_clocksources functions in Linux kernel
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Dave Jones <davej>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: anton, esandeen, kernel-maint, kreilly, pfrields, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-03-12 10:28:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 378351, 378361    
Bug Blocks:    

Description Jan Lieskovsky 2007-11-12 11:31:29 UTC
Description of problem:

Buffer overflow in the (1) sysfs_show_available_clocksources and (2)
sysfs_show_current_clocksources functions in Linux kernel 2.6.23 and
earlier might allow local users to cause a denial of service or
execute arbitrary code via crafted clock source names. (CVE-2007-5908).

Public via: 

http://marc.info/?l=linux-kernel&m=119451922608530&w=2

Comment 3 Chuck Ebbert 2007-11-12 20:56:51 UTC
This does not look like it can actually happen. The list of available
clocksources is very short and they all have short names.

Comment 4 Eric Sandeen 2007-11-30 05:31:21 UTC
So far looks like nothing committed upstream on this one, either.

Comment 5 Jan Lieskovsky 2007-11-30 13:20:05 UTC
Re: c#3: Chuck so this means, you don't want to fix this one? 

Comment 6 Jan Lieskovsky 2007-11-30 13:21:02 UTC
Re: c#4: Eric, maybe you could initiate the commit to RH kernel mailing list?

Comment 7 Jan Lieskovsky 2008-03-12 10:28:10 UTC
Based on c#3 and further investigation closing this one as WONTFIX.