|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-1265: kernel mmap DoS, maybe priv escalation | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P5 - None | CC: | meissner, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-1265: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
PoC
mmap-fix.patch |
||
|
Description
Ludwig Nussel
2005-05-20 07:12:19 UTC
Created attachment 37505 [details]
PoC
According to Greg this is what went into mainline: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=07ab67c8d0d7c1021343b7d5c045033d6bf7be69 Don't ask me how to get a useable diff from that though ... > Anyone want to give me a CVE number for this issue, so I can put it in
> the changelog and release notes?
CAN-2005-1265. Apologies for delay, just catching up with email before my
flight home.
Cheers, Mark
_________________________
Can somebody please submit the fix for the problem in a usable form as attachment to this bug? How severe is this issue? Do we need to address it immediately? Kernels are already almost scheduled for release... Created attachment 38317 [details]
mmap-fix.patch
extracted from interdiff 2.6.11.10 -> 2.6.11.11
Andrea seems to be the one who can judge if we need it and in which branches. Andrea can you please check? from andrea (on kernel@)
for whatever reason I can't login on slowzilla right now (bz-login
stopped working).
The top-down allocator is never on by default AFIK and almost all our
distro should not have it (i.e. no way to enable it in the old distro).
I guess only SL93 may require an update. Various apps can break when
using top-down so its utilization should be discouraged IMHO (RH folks
thinks different here).
> Do we need to stop the current kernel update to include this or
> can it wait approx 5 more weeks for the next one?
If it really only affects top-down the severity seems pretty low
(perhaps Fedora enables it by default and it's more serious for them or
something like that, but for us the impact should be almost none). Just
returning to the default boot cmdline will fix it too, which is
very reasonable short term workaround.
from greg: On Mon, May 30, 2005 at 02:59:58PM +0200, Marcus Meissner wrote: > Hi folks, > > The bugreport: > https://bugzilla.novell.com/show_bug.cgi?id=84728 > has a denial of service condition in the mmap top-down allocator, > fixed in 2.6.11.11. Do you mean the patch from Linus? That only fixes a bug that was currently in the 2.6.12-rc tree (and could be hit easily there), but could not be triggered in the 2.6.11 kernel. We put it in .11 just to make sure. > As far as I can see it might also have a privilege escalation > hidden in there, but I would to poll for your opinion. > > Can someone enlighten me a bit? > > Do we need to stop the current kernel update to include this or > can it wait approx 5 more weeks for the next one? I think it can wait. thanks, greg k-h from andrea: Then none of our kernels need updates. I'll check the patch in more details to be sure sl9.3 really is safe. For sure older distro can't be affected since they've not the top-down thing (we support mapped-base feature instead, not in mainline yet and not buggy). from greg: Here's the patch: http://www.kernel.org/git/?p=linux/kernel/git/gregkh/linux-2.6.11.y.git;a=commit +;h=27d050adf5cea402a3da5ca7564a23bf87ce7bef thanks, greg k-h (same content like greg already quoted above) since currently shipping kernels are not affected i am closing this as wontfix. CVE-2005-1265: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P) |