Bug 460862

Summary: kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-4.7.z]
Product: Red Hat Enterprise Linux 4 Reporter: Eugene Teo (Security Response) <eteo>
Component: kernelAssignee: Vitaly Mayatskikh <vmayatsk>
Status: CLOSED ERRATA QA Contact: Martin Jenner <mjenner>
Severity: high Docs Contact:
Priority: high    
Version: 4.7.zCC: davej, dhoward, jan.iven, jplans, lwang, qcai, security-response-team, vmayatsk
Target Milestone: rcKeywords: Reopened, ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-01-14 18:06:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 460857, 460859    
Bug Blocks:    

Description Eugene Teo (Security Response) 2008-09-02 04:55:52 UTC
+++ This bug was initially created as a clone of Bug #460857 +++

Description of problem:
Eugene Teo discovered that range_is_allowed() check is only added in
{read,write}_mem(). It is possible for an illegitimate application to bypass
these checks, and access /dev/mem beyond the 1M limit by calling mmap_mem()
instead.

--- Additional comment from eteo on 2008-09-02 00:07:32 EDT ---

This appears to be fixed in upstream since commit e2beb3eae.

Comment 1 RHEL Program Management 2008-09-02 08:23:55 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 2 Jiri Skrabal 2008-10-02 12:52:16 UTC
Closing this BZ. We do not have a business case for 4.7.z.

Comment 5 Vitaly Mayatskikh 2008-12-10 15:19:55 UTC
Committed in 78.0.10

Comment 10 errata-xmlrpc 2009-01-14 18:06:24 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2009-0014.html