Bug 204360

Summary: CVE-2006-3741 sys_perfmonctl() file descriptor reference count issue
Product: Red Hat Enterprise Linux 4 Reporter: Marcel Holtmann <holtmann>
Component: kernelAssignee: Anil S Keshavamurthy <akeshava>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0CC: jbaron, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: ia64   
OS: Linux   
Whiteboard: impact=moderate,source=redhat,reported=20060826,embargo=20060906,public=20060908
Fixed In Version: RHSA-2006-0689 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-10-05 19:19:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Marcel Holtmann 2006-08-28 18:02:25 UTC
From Stephane Eranian:

I discovered a security problem with perfmon2.0 in mainline kernel. Under
certain circumstances, the perfmonctl() system call may not correctly manage the
file descriptor reference count. As a consequence, the system may run out of
file structure.

Comment 5 Anil S Keshavamurthy 2006-08-28 21:42:16 UTC
(In reply to comment #3)
> Use bug 204400 for RHEL3 then.
> 
Sorry about the noice here.. Checked the sources for RHEL3 U8 (kernel 2.4.21-47)
and looks like the fix is not required for RHEL3. I will go ahead and update the
bugzilla 204400.


Comment 8 Marcel Holtmann 2006-08-30 10:52:02 UTC
Running the test case on a system where the default nfile limits for a user are
still in place the user session will run out of file handles:

[test@bohr ~]$ ./test_fd1 
fopen: Too many open files in system
[test@bohr ~]$ bash
-bash: start_pipeline: pgrp pipe: Too many open files in system
-bash: /bin/bash: Too many open files in system

Any further login attempt for this user and all other non-privileged users will
fail after this test.

Since this affects all unprivileged users, it might affect unprivileged
processes like Apache childs etc.


Comment 9 Jason Baron 2006-09-22 00:39:47 UTC
committed in stream U5 build 42.13. A test kernel with this patch is available
from http://people.redhat.com/~jbaron/rhel4/


Comment 10 Jason Baron 2006-09-26 14:31:16 UTC
committed in stream E5 build 42.0.3

Comment 11 RHEL Program Management 2006-09-27 22:37:09 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 14 Red Hat Bugzilla 2006-10-05 19:19:39 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0689.html