Bug 460251 - (CVE-2008-3527) CVE-2008-3527 kernel: missing boundary checks in syscall/syscall32_nopage()
CVE-2008-3527 kernel: missing boundary checks in syscall/syscall32_nopage()
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,source=secalert,repo...
: Security
Depends On: 460275 460276
Blocks:
  Show dependency treegraph
 
Reported: 2008-08-27 00:25 EDT by Eugene Teo (Security Response)
Modified: 2010-12-21 12:24 EST (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Tavis Ormandy reported missing boundary checks in the Virtual Dynamic Shared Objects (vDSO) implementation. This could allow a local unprivileged user to cause a denial of service or privilege escalation. (CVE-2008-3527, Important)
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-12-21 12:24:17 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch for this issue (3.60 KB, patch)
2008-11-04 03:33 EST, Eugene Teo (Security Response)
no flags Details | Diff
Proposed backported patch (12.91 KB, patch)
2008-11-04 03:38 EST, Eugene Teo (Security Response)
no flags Details | Diff

  None (edit)
Comment 27 Eugene Teo (Security Response) 2008-11-04 03:30:50 EST
Description of problem:
Tavis Ormandy reported missing boundary checks in the Virtual Dynamic Shared Objects (vDSO) implementation. This could allow a local unprivileged user to cause a denial of service or privilege escalation.
Comment 28 Eugene Teo (Security Response) 2008-11-04 03:33:09 EST
Proposed upstream patch:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7d91d531900bfa1165d445390b3b13a8013f98f7

The patch should fix both the i386 and the x86_64/ia32 bits.
Comment 29 Eugene Teo (Security Response) 2008-11-04 03:33:57 EST
Created attachment 322397 [details]
Upstream patch for this issue
Comment 30 Eugene Teo (Security Response) 2008-11-04 03:38:32 EST
Created attachment 322399 [details]
Proposed backported patch
Comment 33 Vincent Danen 2010-12-21 12:24:17 EST
This was addressed via:

Red Hat Enterprise Linux version 5 (RHSA-2008:0957)

Note You need to log in before you can comment on or make changes to this bug.