Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 356557 (CVE-2011-1070) - <sys-apps/v86d-0.1.10: Failure to validate netlink message sender (CVE-2011-1070)
Summary: <sys-apps/v86d-0.1.10: Failure to validate netlink message sender (CVE-2011-1...
Status: RESOLVED FIXED
Alias: CVE-2011-1070
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://repo.or.cz/w/v86d.git/commit/f...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-02-26 09:18 UTC by Paweł Hajdan, Jr. (RETIRED)
Modified: 2014-12-25 15:53 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-02-26 09:18:14 UTC
Versions of the v86d userspace helper for the Linux uvesafb driver
before 0.1.10 did not verify that received netlink messages were sent
by the kernel, allowing unprivileged users to manipulate the video
mode and potentially other consequences.

v86d executes video BIOS code with access to /dev/mem in response to
netlink messages, using either vm86 mode or an x86 emulator, depending
on configuration. I an unclear on whether it is possible to e.g. crash
the machine or escalate privileges by spoofing requests, or only to
mess with the video card.

References:
http://repo.or.cz/w/v86d.git/commit/f9abfd412639286c3143e93e8ba2c9598dfba640

Is it OK to stabilize =sys-apps/v86d-0.1.10?
Comment 1 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-02-26 09:21:09 UTC
Michał, could you also provide more info about possible impact? For now I'm rating it B1, because we can't rule out local privilege escalation.
Comment 2 Michal Januszewski (RETIRED) gentoo-dev 2011-02-26 13:28:16 UTC
It should be OK to stabilize the new version in an expedited manner.  The only difference between 0.1.10 and 0.1.9 is the sender verification. 0.1.10 also includes a patch, which has however been also included in 0.1.9 in Gentoo.

The primary impact is that any user is able to change the video mode, which would lead to display corruption, as neither the kernel nor X would be informed about the video mode being changed.  Other than that, it also makes it possible for any user to execute int 0x10 (video BIOS services).  I'm not sure if there is any way to exploit this for privilege escalation.
Comment 3 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-02-26 14:53:20 UTC
Thank you. Arches, please stabilize =sys-apps/v86d-0.1.10
Comment 4 Agostino Sarubbo gentoo-dev 2011-02-27 13:34:40 UTC
amd64 ok

few problem with depend, posted on bug 356689
Comment 5 Markos Chandras (RETIRED) gentoo-dev 2011-02-27 13:54:36 UTC
amd64 done. Thanks Agostino
Comment 6 Christian Faulhammer (RETIRED) gentoo-dev 2011-02-27 16:01:51 UTC
x86 stable, last one so update the whiteboard
Comment 7 Tim Sammut (RETIRED) gentoo-dev 2011-02-27 17:10:27 UTC
Thanks, everyone.

GLSA Vote: no.
Comment 8 Tim Sammut (RETIRED) gentoo-dev 2011-03-02 06:45:34 UTC
CVE assignment per http://www.openwall.com/lists/oss-security/2011/02/28/10.
Comment 9 Stefan Behte (RETIRED) gentoo-dev Security 2011-10-08 22:38:48 UTC
Vote: NO. Closing noglsa.