|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-0424: Linux kernel setsockopt MCAST_MSFILTER integer overflow | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Sebastian Krahmer <krahmer> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Critical | ||
| Priority: | P3 - Medium | CC: | drahn, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2004-0424: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | minimal patch from Dave Jones. | ||
|
Description
Marcus Meissner
2004-04-21 04:54:09 UTC
<!-- SBZ_reproduce --> na Created attachment 18473 [details]
minimal patch from Dave Jones.
minimal patch from Dave Jones as posted on vendor-sec.
The issue is public. 9.1 is not affected according to changelog, so setting version to 9.0 The only affected kernel is the SL81 = SLES8SP3 = SL90 kernel. SL91 is not affected nor is SL82 or SL80. SLES9 is unaffected as well, and so is SLES7. Nor are previous SPs from SLES8 affected. I committed a fix to kernel CVS. I'll submit packages to SL9.0 and 8.1. The 8.1 one should end up in SLES8SP3 as well. Done. Now it's up to autobuild team, security team, QA, and our maintenance ppl to get the kernel out of the door, _if_ this bug is deemed important enough to release a security update. From: Mark J Cox <mjc@redhat.com> on vendor-sec > Here's the bare minimum fix I'm going to be rolling into our Ernie noticed an inconsistancy in that patch set: > +++ linux-2.4.22/net/ipv4/ip_sockglue.c 2004-04-20 14:10:50.000000000 +0100 > if (GROUP_FILTER_SIZE(gsf->gf_numsrc) < optlen) { > +++ linux-2.4.22/net/ipv6/ipv6_sockglue.c 2004-04-20 14:18:05.000000000 +0100 > + if (GROUP_FILTER_SIZE(gsf->gf_numsrc) > optlen) { So if you're preparing updates based solely on that patch you should definately fix that. Mark So make suire the last > is a < ... *** Bug 54220 has been marked as a duplicate of this bug. *** Fsck, I've overlooked the < vs > inconsistency as well. OK, fixed in CVS now. I did not commit a kernel again; Hubert has more security fixes in the queue, but we don't know whether those can be published already. If this is the signal DoS, fb_copy and cpu_freq issue, they are already public except cpu_freq but there is no disclosure date and we can fire at will. For the signal DoS, there's no fix out there, is there? And I don't expect a short-term solution ... But there is: fix possible DoS in do_fork(); not yet disclosed from Apr 16. For the cpu_freq bug I have not yet seen a fix. Will try to come up with one myself. The fb_copy_mem seems incomplete. Andrea posted another one to our kernel list. And yet another one is completely open. Oh well... Well, we got a L3 request regarding this security issue by IBM last night. Can somebody give an ETA? I don't want to open another bug since I think all people involved are loaded enough with this one. ETA would be early next week. I have just communicated the details to Mark VanderWiele <markv@us.ibm.com> and Bill Hartner <bhartner@us.ibm.com>. CAN-2004-0424 Kernels have been submitted and are waiting for check in. over two days, and still nothing.. how long can it take to check in a package? they have been checked in in the meantime and are making their way through QA. kernels are approved and announced. CVE-2004-0424: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) |