Bug 239767 (CVE-2006-7203)
| Summary: | CVE-2006-7203 oops in compat_sys_mount() when data pointer is NULL | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Vasily Averin <vvs> | ||||
| Component: | vulnerability | Assignee: | Jeff Layton <jlayton> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Martin Jenner <mjenner> | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | coughlan, khorenko, kreilly, security-response-team, staubach, steved | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2007-12-18 08:35:17 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 239922, 240456, 243263, 290741 | ||||||
| Bug Blocks: | |||||||
| Attachments: |
|
||||||
|
Description
Vasily Averin
2007-05-11 07:10:30 UTC
about compat_sys_mount(): RHEL4 kernels are vulnerabled too We don't ship RHEL5 with smbfs enabled. I'll move this to a RHEL4 BZ and we can address it there. Jeff, I would note: it is not samba-related issue, It is bug in 32-bit compat for sys_mount and it is not requires smbfs enabled. Also I would note that I've reproduced this issue on your latest RHEL5 kernel. Just try to reproduce it, it works. I see, my mistake. I'll move this back to RHEL5 and clone this bug for RHEL4 as well... This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. Created attachment 154585 [details]
reproducer program
Had some problem getting this to reproduce on RHEL4, so here is a simpler
reproducer program. Compile with:
gcc -m32 -static
...and run as an unprivileged user and the box will panic.
Anoither note: As you can see, I was not able to crash the node by using usual mount (/bin/mount was copied from 32-bit RHEL4u3 node) [test@dhcp0-43 tmp]$ /tmp/mount -t smbfs // /mnt mount: only root can do that but node was crashed when the same command was running under strace. I do not understand how it's possible and suppose that it may point to some another issue. This request was evaluated by Red Hat Kernel Team for inclusion in a Red Hat Enterprise Linux maintenance release, and has moved to bugzilla status POST. Thanks for the report, I've posted the patch for internal review. It's not clear to me either why strace makes a difference here with an unprivileged user (though I've not looked too closely). Would you mind opening a new case for that against the util-linux package? It may turn out to be a ptrace problem (or it may be expected for some reason), though we should probably look at why it occurs... I've reported to vendor-sec about this issue. A patch for this issue is included in build 2.6.18-20.el5. I'm moving this bug to Security Response parent as the flaw affected multiple versions of RHEL, and we've already fixed this issue for RHEL5 in RHSA-2007:0376 and RHEL4 in RHSA-2007:0488. (I will open separate tracking bug for 5.1 to replace this bug) confirmed the -52.el5 kernel is not vulnerable by running the attached test case. Issue was addressed in following erratas for affected Red Hat Enterprise Linux versions: http://rhn.redhat.com/errata/RHSA-2007-0376.html http://rhn.redhat.com/errata/RHSA-2007-0488.html Fedora kernel versions were updated to fixed upstream versions. |