Bug 637688 (CVE-2010-2962) - CVE-2010-2962 kernel: arbitrary kernel memory write via i915 GEM ioctl
Summary: CVE-2010-2962 kernel: arbitrary kernel memory write via i915 GEM ioctl
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-2962
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 637689 637690 637691
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-09-27 06:24 UTC by Eugene Teo (Security Response)
Modified: 2023-05-11 15:06 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-03-28 08:43:59 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0842 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2010-11-22 19:34:20 UTC
Red Hat Product Errata RHSA-2010:0958 0 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2010-12-08 19:08:55 UTC

Description Eugene Teo (Security Response) 2010-09-27 06:24:50 UTC
Description of problem:
Kees found a flaw in the i915 GEM ioctl interface that does not check destination addresses during memory copies, allowing arbitrary memory writes into the kernel. The flaws are in drivers/gpu/drm/i915/i915_gem.c in i915_gem_pread_ioctl() and i915_gem_pwrite_ioctl(), which do no access_ok() checks on args->data_ptr. (Actually, there is one check path: i915_gem_gtt_pwrite_fast() does the check, but none of the other helpers do.).

Acknowledgements:

Red Hat would like to thank Kees Cook for reporting this issue.

Comment 3 Eugene Teo (Security Response) 2010-09-27 07:01:09 UTC
Statement:

The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not include support for Graphics Execution Manager (GEM) in the i915 driver, and therefore are not affected by this issue.

Comment 4 Eugene Teo (Security Response) 2010-10-12 06:54:03 UTC
Upstream commit:
http://git.kernel.org/linus/ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4

Comment 5 errata-xmlrpc 2010-11-10 19:08:49 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2010:0842 https://rhn.redhat.com/errata/RHSA-2010-0842.html

Comment 6 errata-xmlrpc 2010-11-22 19:35:02 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2010:0842 https://rhn.redhat.com/errata/RHSA-2010-0842.html

Comment 8 errata-xmlrpc 2010-12-08 19:09:10 UTC
This issue has been addressed in following products:

  MRG for RHEL-5

Via RHSA-2010:0958 https://rhn.redhat.com/errata/RHSA-2010-0958.html


Note You need to log in before you can comment on or make changes to this bug.