Red Hat Bugzilla – Bug 229885
CVE-2007-0958 core-dumping unreadable binaries via PT_INTERP
Last modified: 2007-11-30 17:07:42 EST
+++ This bug was initially created as a clone of Bug #228886 +++ CVE-2004-1073 is still an issue -- PoC can still cause a coredump of a non-readable binary such as /usr/bin/sudo; PoC attached; the tweak is question is adding: eph.p_memsz = 4097; Run "./poc /usr/bin/sudo" and a "core" spits out -- WFM on a 2.6.17.x kernel. -- Additional comment from holtmann@redhat.com on 2007-02-15 14:07 EST -- Created an attachment (id=148136) Proposed upstream patch -- Additional comment from pm-rhel@redhat.com on 2007-02-23 14:04 EST -- This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. -- Additional comment from jturner@redhat.com on 2007-02-23 14:05 EST -- QE ack for RHEL5.
A patch addressing this issue is included in build 2.6.18-8.1.1.el5.
ok, with that change I can now reproduce the problem and have sucessfully tested the fix on i686 and x86_64 (using a 32-bit poc and sudo binary)
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2007-0099.html