Bug 475446 (CVE-2008-5396) - CVE-2008-5396 zaptel: Array index error in multiple zaptel drivers
Summary: CVE-2008-5396 zaptel: Array index error in multiple zaptel drivers
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2008-5396
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://bugs.digium.com/view.php?id=13954
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-12-09 09:31 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:28 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-01-20 18:44:56 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2008-12-09 09:31:51 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5396 to
the following vulnerability:

Array index error in the (1) torisa.c and (2) dahdi/tor2.c drivers in
Zaptel (aka DAHDI) 1.4.11 and earlier allows local users in the
dialout group to overwrite an integer value in kernel memory by
writing to /dev/zap/ctl, related to missing validation of the sync
field associated with the ZT_SPANCONFIG ioctl.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5396
http://www.openwall.com/lists/oss-security/2008/12/03/10
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507459
http://bugs.digium.com/view.php?id=13954

Patches:
http://bugs.digium.com/file_download.php?file_id=20796&type=bug  (tor2)
http://bugs.digium.com/file_download.php?file_id=20797&type=bug  (torisa)
http://bugs.digium.com/file_download.php?file_id=20808&type=bug  (wcte11xp)

Comment 1 Jan Lieskovsky 2008-12-09 09:34:24 UTC
This issue affects all versions of the zaptel package, as shipped
with Fedora releases of 8, 9 and 10.

This issue affects the version of the zaptel package, as shipped
with Fedora Extra Packages for Enterprise Linux 5 (EPEL 5) project.

Please update the packages.

Comment 4 Jan Lieskovsky 2008-12-19 11:20:07 UTC
There looks to be an array index overflow problem in the upstream tor2 patch.
Have brought forward upstream with this issue in:

http://bugs.digium.com/view.php?id=13954#96700

Comment 5 Eugene Teo (Security Response) 2008-12-19 13:23:13 UTC
(In reply to comment #4)
> There looks to be an array index overflow problem in the upstream tor2 patch.
> Have brought forward upstream with this issue in:
> 
> http://bugs.digium.com/view.php?id=13954#96700

The issue has been addressed in upstream:
http://svn.digium.com/view/dahdi?view=rev&revision=5590

Comment 6 Tomas Hoger 2009-01-20 18:27:59 UTC
I'm bit confused here.  Affected files are indeed part of the zaptel SRPM, but according to the build logs, they are not built or shipped in any of the (binary) RPMS.  The code does not seem to be part of the upstream kernel, and Fedora does no longer permit shipping kernel modules packages.  Can anyone clarify this?  This looks like notabug for Fedora.

Comment 7 Jeffrey C. Ollie 2009-01-20 18:37:59 UTC
Yes, Fedora only ships the userspace libraries.  The zaptel/dadhi modules are not in the upstream kernel and Fedora prohibits kernel modules shipped outside of the kernel RPM.

I'd agree this is notabug.

Comment 8 Tomas Hoger 2009-01-20 18:44:56 UTC
Jeffrey, thanks for quick confirmation!  Closing.


Note You need to log in before you can comment on or make changes to this bug.