cvs commit: src/sys/compat/linux linux_misc.c
rwatson at FreeBSD.org
Sat Jun 24 23:33:03 UTC 2006
On Fri, 23 Jun 2006, Alexander Leidinger wrote:
> I realized this may be a little bit misleading...
Quite. The term "panic" in the context of a kernel change typically refers to
a kernel panic -- i.e., panic().
> The NULL pointer is used as the destination in a copyout. And it writes at
> the userland address 0. This will not lead to a kernel panic, but it will do
> malicious things to the program which uses the linux times syscall. So this
> is not a DoS in any case. The problematic case is when a linux program uses
> a NULL pointer in the times syscall conditionally. This may render the
> service which uses such a linux program useless sometimes. For programs
> which use NULL there every time, this is not a DoS, it's just a normal bug
> (e.g. you can't use Oracle 10g Express) which prevents the use of this
I think this this is not an appropiate use of the term "malicious".
> So this is not a a huge security flaw, it's more a not so small
> inconvenience. Since the RELENG_x_y branches are under control of the
> secteam, I used the "Security:" mark up to encode the possible need to merge
> this (I'm assuming Oracle 10g is important enough that we want our users to
> be able to run it).
This isn't just not a huge security flaw, it's not a security flaw at all.
It is a reliability bug due to a mis-implemented API that results in a clean
failure in the presence of a well-characterized case. It doesn't appear to be
exploitable to gain privilege, deny service rmeotely, etc. If this is a
critical stability fix, it should be treated as an errata patch candidate.
In the future, please don't use the "Security" tag for this type of change.
However, do feel free to e-mail re@ to talk about whether this is an errata
patch candidate, keeping secteam@ in the loop, as they currently own the 6.1
Robert N M Watson
University of Cambridge
More information about the cvs-src