oss-security February 2011 archive
Main Archive Page > Month Archives  > oss-security archives
oss-security: [oss-security] CVE request: kernel: /sys/kernel/de

[oss-security] CVE request: kernel: /sys/kernel/debug/acpi/custom_method can bypass module restrictions

From: Kees Cook <kees_at_nospam>
Date: Fri Feb 25 2011 - 00:32:25 GMT
To: oss-security@lists.openwall.com


While CVE-2010-4347 covers the unprivileged to fully privileged escalation
issue, this interface still allows an unprivileged root user to gain
back all their capabilities.

Having a system with acpi and debugfs built into the kernel allows
a uid=0 user (without capabilities, e.g. in containers) to write to
arbitrary kernel memory, likely resulting in escalated capability
privileges[1], or unlocking an otherwise modules-disabled kernel by
changing /proc/sys/kernel/modules_disabled back to 0.



[1] http://jon.oberheide.org/files/american-sign-language.c

-- Kees Cook Ubuntu Security Team