|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-1144: root hole in 2.4 x86-64 kernel | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Andreas Kleen <ak> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Blocker | ||
| Priority: | P3 - Medium | CC: | aj, rf, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Andreas Kleen
2004-12-14 16:04:58 UTC
<!-- SBZ_reproduce --> Exploit should be easy to write from the description. added project managers for awareness It's not confirmed yet, but I plan to embargo this until Dec 30 (about 2 weeks) Can we get security kernels for SLES8 and 9.0 ready by then? No, we cannot. The current maintenance update in the queue is the last one for this year, after release most of the people will already be gone into Xmas holidays. Earliest release of the next round of updates might be second week of january, but likely later. Sorry, but I'm unwilling to embargo the bug for over a month. That's far too long for mainline. You'll have to live with a delayed update then. feel free to release it whenever you like ... i am fine with a delayed update in t his case. Ok. But you are aware that this is a real easy to exploit root hole? Not one of the usual "maybe could be exploited somehow" issues? yes. I try to think of something. :/ btw, does this fix really help? mov eax,eax ? or has it excplicit clear of the upper 32bit? Fix is correct. The 32bit self move clears the upper 32bits. CAN-2004-1144 talked to Ralf and Hubert. - after we released the current patch of update kernels (today or tomorrow) Hubert will check in a new kernel source for SLES 8 containing just this additional fix. - Only a patchinfo for ul1-x86_64 will be submitted. - QA should start ASAP on this kernel, so it is tested before Christmas vacations. - The security team member on duty will approve it as soon as it is public. Since the SLES 8 SP3 branch is not tracked by KOTD we can commit the fix there I think. Ok thanks. I will ask on vendor-sec again for an earlier date, as the RH guys prefered and nobody else complained so far. That would be a in week. That's ok? i can't really say how fast we can be ready with all things including QA. I guess earliest next Tuesday or Wednesday. Wednesday 22.12. would be a nice day too I guess. New embargo date is 22.12 12:00 GMT Hubert will submit a new kernel from UL1-SP3 branch to done/SLES8 friday morning. I will submit a patchinfo (together with Harald). Testing should start as soon as we have a free sles8-x86_64 machine. Kernel has been submitted for checkin. kernels released... waiting for connetion to company to come backup to write advisory. advisory released. |