CVE-2006-6304 affect kernel on RHEL5?

Solution Verified - Updated -

Issue

*******************************************************
--- linux-2.6.19.orig/fs/exec.c
+++ linux-2.6.19/fs/exec.c
@@ -1515,7 +1515,8 @@ int do_coredump(long signr, int exit_cod
ispipe = 1;
} else
file = filp_open(corename,
- O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE, 0600);
+ O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE | flag,
+ 0600);
if (IS_ERR(file))
goto fail_unlock;
inode = file->f_dentry->d_inode
*******************************************************

You can see "flag" option is added in filp_open().

I compared kernel-2.6.19.1 to kernel-2.6.18-128(RHEL5), but kernel-2.6.18 is
not patched.

/linux-2.6.19.1/fs/exec.c
***************
int do_coredump(long signr, int exit_code, struct pt_regs * regs)
:
:

} else
file = filp_open(corename,
! O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE | flag,
! 0600);
***************

/linux-2.6.18-128/fs/exec.c
---------------
int do_coredump(long signr, int exit_code, struct pt_regs * regs)
:
:

}
} else
file = filp_open(corename,
! O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE, 0600);
!
---------------

Environment

  • Red Hat Enterprise Linux 5.3 x86_64/x86 with kernel-2.6.18-128.el5

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content