On Wed, 18 Jul at 2018 05:02:06 +0200 Alessandro Selli <alessandrose...@linux.com> wrote:
> On Wed, 18 Jul 2018 at 03:21:14 +0200 > Adam Borowski <kilob...@angband.pl> wrote: > >> On Tue, Jul 17, 2018 at 05:24:11PM -0700, Rick Moen wrote: >>> Quoting Adam Borowski (kilob...@angband.pl): >>> >>>> Then there are local exploits. Ted Ts'o for example keeps fuzzying >>>> ext4 for years yet exploitable bugs still pop up frequently -- usually >>>> just DoS but arbitrary code execution isn't unheard of. >>> >>> I've read a lot of e2fsprogs CVEs, and cannot recall any ever having >>> been _proved exploitable_ to allow arbitrary code execution. In a >>> number of cases, there have been bugs, generally buffer overflows, that >>> in theory could _possibly_ lead to arbitrary code execution that in >>> theory might exploit privileged code such as e2fsprogs mount code, thus >>> in theory possibly supporting privilege escalation. >> >> I'm talking about kernel not progs, and those don't get issued CVEs. > > A 5 secs search for "linux kernel CVE" disagrees with you: > https://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33 > > Why on Earth would ever a kernel vulnerability not be issued a CVE? All right, on second reading I think I misunderstood you: you mean e2fsprogs do not get CVEs. Well, it's still wrong, a 5 secs search for "linux e2fsprogs CVE" disagrees with you: https://www.suse.com/security/cve/CVE-2015-1572/ "Description Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty." Regards, Alessandro _______________________________________________ Dng mailing list Dng@lists.dyne.org https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng