Red Hat Bugzilla – Bug 229885
CVE-2007-0958 core-dumping unreadable binaries via PT_INTERP
Last modified: 2007-11-30 17:07:42 EST
+++ This bug was initially created as a clone of Bug #228886 +++
CVE-2004-1073 is still an issue -- PoC can still cause a coredump of a
non-readable binary such as /usr/bin/sudo; PoC attached; the tweak is question
eph.p_memsz = 4097;
Run "./poc /usr/bin/sudo" and a "core" spits out -- WFM on a 2.6.17.x kernel.
-- Additional comment from email@example.com on 2007-02-15 14:07 EST --
Created an attachment (id=148136)
Proposed upstream patch
-- Additional comment from firstname.lastname@example.org on 2007-02-23 14:04 EST --
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release. Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products. This request is not yet committed for inclusion in an Update
-- Additional comment from email@example.com on 2007-02-23 14:05 EST --
QE ack for RHEL5.
A patch addressing this issue is included in build 2.6.18-8.1.1.el5.
ok, with that change I can now reproduce the problem and have sucessfully tested
the fix on i686 and x86_64 (using a 32-bit poc and sudo binary)
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.