Bug 459226 (CVE-2008-3276)
Summary: | CVE-2008-3276 Linux kernel dccp_setsockopt_change() integer overflow | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Eugene Teo (Security Response) <eteo> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | low | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | unspecified | CC: | davids, dhoward, jpirko, jrusnack, lgoncalv, lwang, williams | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2010-12-23 21:48:29 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 459231, 459232, 459235 | ||||||||
Bug Blocks: | |||||||||
Attachments: |
|
Description
Eugene Teo (Security Response)
2008-08-15 07:35:02 UTC
Proposed upstream patch: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3e8a0a559c66ee9e7468195691a56fefc3589740 Created attachment 314378 [details]
Upstream patch for this issue
Created attachment 314606 [details]
Proposed backported patch for MRG kernel
On Red Hat Enterprise Linux 5, SELinux denies access requested by default: type=AVC msg=audit(1217928226.398:41): avc: denied { create } for pid=4974 comm="server" scontext=user_u:system_r:unconfined_t:s0 tcontext=user_u:system_r:unconfined_t:s0 tclass=dccp_socket type=SYSCALL msg=audit(1217928226.398:41): arch=c000003e syscall=41 success=no exit=-13 a0=2 a1=6 a2=21 a3=0 items=0 ppid=3599 pid=4974 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts0 ses=1 comm="server" exe="/home/test/dccp-CVE-2008-3276/server" subj=user_u:system_r:unconfined_t:s0 key=(null) socket(PF_INET, 0x6 /* SOCK_??? */, 0x21 /* IPPROTO_??? */) = -1 EACCES (Permission denied) Patch queued for -78 Verified. Found both proposed and backported patch as mrg-rt.git commit 3e1ad8433fc1b6ca4eafd4b8b349ea88ef135fd2. Disabled SELinux and run reproducer on 2.6.24.7-74rt and 2.6.24.7-81rt kernels. Kernel crashed on -74rt and gave "setsockopt: Invalid argument" as error on -81rt. This was addressed via: MRG Realtime for RHEL 5 Server (RHSA-2008:0857) Red Hat Enterprise Linux version 5 (RHSA-2008:0957) |