Bug 175519

Summary: CVE-2004-2607 sdla_xfer casting flaw
Product: Red Hat Enterprise Linux 3 Reporter: Mark J. Cox <mjc>
Component: kernelAssignee: John W. Linville <linville>
Status: CLOSED NOTABUG QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0CC: dhoward, jbaron, lwang, petrides
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: source=cve,reported=20051202,public=20040416,impact=moderate
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-12-13 02:27:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2005-12-12 09:08:14 UTC
The Sangoma frame relay driver could allow local users to read
large portions of kernel memory.

fixed=2.6.5
http://linux.bkbits.net:8080/linux-2.6/cset@4083fdb65KiH8zD6KliRqh6HrON_sw

fixed=2.4.29
http://linux.bkbits.net:8080/linux-2.4/cset@41e2d02a-1uIuT2ka6ipdvsj4sTwJg

Comment 1 Ernie Petrides 2005-12-13 02:27:48 UTC
Hi, Mark.  While the RHEL3 version of the net/wan/sdla.c could be improved
with the two (different) fixes referred to above, its ioctl handler is
restricted to super-user usage by virtue of this code in sdla_ioctl():

        if(!capable(CAP_NET_ADMIN))
                return -EPERM;

Given that there is no security hole and that drivers/net/wan is contained
in the RHEL3 "unsupported module" list, I'm closing this as NOTABUG.