Control: found -1 4.6.2-1

[Petter Reinholdtsen]
> If I understand the issue correctly, a user with access to /dev/video
> can cause the kernel to leak memory and eventually run out of memory by
> doing repeated calls to mmap().  In other words, users with video group
> membership can bring down the machine.

I've tried to track down a way to reproduce the problem without any
luck so far.  I asked on #v4l to see if anyone there could help and got
some more information:

<pere> hi.  I'm trying to figure out if CVE-2010-5321 reported via
   <URL: https://bugzilla.redhat.com/show_bug.cgi?id=620629 > still
   exist in the linux kernel, and it links to
   <URL: https://linuxtv.org/irc/v4l/index.php?date=2010-07-29 > for
   more information.  But that IRC log page is empty.  Anyone here know
   how to reproduce the problem or find the log from that day?
<pinchartl> pere: that's old
<pinchartl> the bug seems to affect videobuf only, not videobuf2
<pere> yeah.  at it seem to be unsolved, but I have not been able to verify it.
<pinchartl> not all drivers have been converted to videobuf2
<pinchartl> but if the drivers you are interested in have been, then you
   should be safe from that point of view
<pere> my focus is tracking CVEs in Debian, to know if the issue still
   exist or not.
<pere> <URL: https://security-tracker.debian.org/tracker/CVE-2010-5321 >
   show the kernel still vulnerable...
<pinchartl> I don't know I'm afraid
<pinchartl> (one more reason to get rid of videobuf)
<pere> how can I tell if a driver/device uses videobuf and not videobuf2?
   I assume some specific hardware is needed to reproduce the problem.
<pinchartl> search for #include <media/videobuf-.*.h> in the sources
<pinchartl> there's 9 of them left if I count properly
<pinchartl> via-camera, fsl-viu, bttv, cx18, tm6000, zr364xx, cx231xx,
   pxa_camera and omap_vout
<pinchartl> ah, and omap1_camera and timblogiw in staging
<pinchartl> so that's 11
<pere> hm, wonder if I have a PCI card supported by bttv...
<pinchartl> patches would be great :-)
<pere> I am sure it would, but lack the capacity too look into that. :)
<pere> pinchartl: is the description in that bug report enough for you to
   know how to reproduce it?  I've tried writing a test program, but only
   got a v4l2 device and got EBUSY when calling mmap() several times there.
<pere> but I suspect my test program is flawed, as I did not really quite
   understand the description.
<pere> the redhat bug report was very short, and I suspect the details are
   in one of the referred bug reports, which are not available to the public. :(

According to this report the issue still exist in the kernel for a small
number of camera drivers, so I mark it as found in the unstable kernel too.

I notice this bug is tagged upstream.  Is there a bug report upstream too?
I've been unable to find any.

-- 
Happy hacking
Petter Reinholdtsen

Reply via email to