Bug 294541 (CVE-2007-4573)

Summary: CVE-2007-4573 x86_64 syscall vulnerability
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: anton, burt, dhoward, eteo, jan.iven, jbaron, kreilly, lwang, lwoodman, qcai, rmonk, roland, vanhoof, vmayatsk
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-17 15:38:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 297841, 297851, 297861, 297871, 297881    
Bug Blocks:    
Attachments:
Description Flags
Andis proposed patch none

Description Mark J. Cox 2007-09-18 11:20:45 UTC
Wojciech Purczynski of COSEINC notified us of a kernel security issue that could
lead to local privilege escalation on x86_64 platforms.

draft advisory to follow.

Acknowledgements:

Red Hat would like to thank Wojciech Purczynski for reporting this issue.

Comment 5 Mark J. Cox 2007-09-19 08:13:47 UTC
Note that for RHEL5 this fix probably also need to be applied to ia32entry-xen.S
created by linux-2.6-xen.patch

Comment 13 Roland McGrath 2007-09-21 21:01:25 UTC
Fix has been committed upstream (public)

Comment 15 Mark J. Cox 2007-09-22 07:15:01 UTC
public, removing embargo

Comment 17 Mark J. Cox 2007-09-24 09:56:09 UTC
Details of privilege escalation consequence now public via advisory:
http://marc.info/?l=full-disclosure&m=119062587407908&w=2

(opening up initial comment in this bug)

Comment 24 Jan Iven 2007-09-27 14:47:45 UTC
Working exploit has been made public.

Comment 25 Mark J. Cox 2007-09-27 15:22:18 UTC
Jan, updated kernels are progressing through quality engineering.  We'll be
releasing them (for RHEL3,4,5) the moment they pass!

Comment 28 Jan Iven 2007-09-28 14:19:05 UTC
While the Errata kernels have been announced on the enterprise-watch list 18h
ago and are available via RHN, it appears as if the SRPMs aren't yet on
ftp.redhat.com. Could somebody please look for them?

https://rhn.redhat.com/errata/RHSA-2007-0936.html
https://rhn.redhat.com/errata/RHSA-2007-0937.html
https://rhn.redhat.com/errata/RHSA-2007-0938.html

vs

ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/
etc.


Comment 30 Mark J. Cox 2007-10-01 06:14:51 UTC
Jan, we had a short outage on our main ftp server on Friday during which time
the SRPMS we pushed on Thursday were missing from the ftp site.  (They were at
all times available via Red Hat Network).  

I checked this yesterday and the RHEL3 and RHEL4 srpms were present, but the
RHEL5 ones were missing.  This was escalated to our production engineering team
who resolved it.

I've checked again today and the kernel SRPMS for RHEL3, RHEL4, RHEL5 are all
there now (note RHEL5 updates are always in a different place at
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS )