Bug 460251 (CVE-2008-3527)

Summary: CVE-2008-3527 kernel: missing boundary checks in syscall/syscall32_nopage()
Product: [Other] Security Response Reporter: Eugene Teo (Security Response) <eteo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: anton, cebbert, dhoward, jpirko, lwang, mjc, pzijlstr, roland, security-response-team, syeghiay
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Tavis Ormandy reported missing boundary checks in the Virtual Dynamic Shared Objects (vDSO) implementation. This could allow a local unprivileged user to cause a denial of service or privilege escalation. (CVE-2008-3527, Important)
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-12-21 17:24:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 460275, 460276    
Bug Blocks:    
Attachments:
Description Flags
Upstream patch for this issue
none
Proposed backported patch none

Comment 27 Eugene Teo (Security Response) 2008-11-04 08:30:50 UTC
Description of problem:
Tavis Ormandy reported missing boundary checks in the Virtual Dynamic Shared Objects (vDSO) implementation. This could allow a local unprivileged user to cause a denial of service or privilege escalation.

Comment 28 Eugene Teo (Security Response) 2008-11-04 08:33:09 UTC
Proposed upstream patch:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7d91d531900bfa1165d445390b3b13a8013f98f7

The patch should fix both the i386 and the x86_64/ia32 bits.

Comment 29 Eugene Teo (Security Response) 2008-11-04 08:33:57 UTC
Created attachment 322397 [details]
Upstream patch for this issue

Comment 30 Eugene Teo (Security Response) 2008-11-04 08:38:32 UTC
Created attachment 322399 [details]
Proposed backported patch

Comment 33 Vincent Danen 2010-12-21 17:24:17 UTC
This was addressed via:

Red Hat Enterprise Linux version 5 (RHSA-2008:0957)