Date: Fri, 26 Nov 2010 14:31:53 +0300 From: Dmitry Krivenok <krivenok.dmitry@gmail.com> To: Ivan Klymenko <fidaj@ukr.net> Cc: freebsd-hackers@freebsd.org Subject: Re: Simple kernel attack using socketpair. Message-ID: <AANLkTimH58340209kH3SxD_NpfjiJOai6HvL5-Vfd_=2@mail.gmail.com> In-Reply-To: <20101126124922.3947bab4@ukr.net> References: <20101126122639.4fd47cba@ukr.net> <20101126124922.3947bab4@ukr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
I run it on 8.0 and CURRENT and got fatal double fault on both systems:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D
Unread portion of the kernel message buffer:
kern.maxfiles limit exceeded by uid 1001, please see tuning(7).
Fatal double fault
rip =3D 0xffffffff80615f54
rsp =3D 0xffffff803c1fa000
rbp =3D 0xffffff803c1fa000
cpuid =3D 0; apic id =3D 00
panic: double fault
cpuid =3D 0
KDB: enter: panic
Uptime: 8d21h9m48s
Physical memory: 983 MB
Dumping 244 MB: 229 213 197 181 165 149 133 117 101 85 69 53 37 21 5
Reading symbols from /boot/modules/bwn_v4_lp_ucode.ko...done.
Loaded symbols for /boot/modules/bwn_v4_lp_ucode.ko
#0 0xffffffff805cc90a in kproc_shutdown (arg=3D0x0, howto=3DVariable
"howto" is not available.
) at /usr/src/sys/kern/kern_shutdown.c:639
639 printf("Waiting (max %d seconds) for system process
`%s' to stop...",
(kgdb) bt
#0 0xffffffff805cc90a in kproc_shutdown (arg=3D0x0, howto=3DVariable
"howto" is not available.
) at /usr/src/sys/kern/kern_shutdown.c:639
#1 0xffffffff805cce37 in kern_reboot (howto=3D260) at
/usr/src/sys/kern/kern_shutdown.c:216
#2 0xffffffff805cd2c1 in panic (fmt=3D0x1 <Address 0x1 out of bounds>)
at /usr/src/sys/kern/kern_shutdown.c:555
#3 0xffffffff808c7586 in user_ldt_free (td=3D0xffffff800021a300) at cpufun=
c.h:524
#4 0xffffffff808b24dd in Xtss () at /usr/src/sys/amd64/amd64/exception.S:1=
51
#5 0xffffffff80615f54 in db_witness_list_all (addr=3D-2137114768,
have_addr=3D1, count=3D-2137114768, modif=3D0x1 <Address 0x1 out of bounds>=
)
at /usr/src/sys/kern/subr_witness.c:2352
Previous frame inner to this frame (corrupt stack?)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D
On Fri, Nov 26, 2010 at 1:49 PM, Ivan Klymenko <fidaj@ukr.net> wrote:
> =D0=92 Fri, 26 Nov 2010 12:26:39 +0200
> Ivan Klymenko <fidaj@ukr.net> =D0=BF=D0=B8=D1=88=D0=B5=D1=82:
>
>> Hello!
>> Rumor has it that this vulnerability applies to FreeBSD too, with the
>> replacement SOCK_SEQPACKET on SOCK_DGRAM...
> and add:
>
> #include <sys/mount.h>
> #include <sys/wait.h>
> #include <errno.h>
> #include <fcntl.h>
> #include <stdio.h>
> #include <stdlib.h>
> #include <string.h>
> #include <unistd.h>
>
>>
>> http://lkml.org/lkml/2010/11/25/8
>>
>> What do you think about this?
>>
>> Thank you!
> _______________________________________________
> freebsd-hackers@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org=
"
>
--=20
Sincerely yours, Dmitry V. Krivenok
e-mail: krivenok.dmitry@gmail.com
skype: krivenok_dmitry
jabber: krivenok_dmitry@jabber.ru
icq: 242-526-443
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTimH58340209kH3SxD_NpfjiJOai6HvL5-Vfd_=2>
