CVE-2006-6304 affect kernel on RHEL5?

Solution Verified - Updated -

Issue

*******************************************************
--- linux-2.6.19.orig/fs/exec.c
+++ linux-2.6.19/fs/exec.c
@@ -1515,7 +1515,8 @@ int do_coredump(long signr, int exit_cod
ispipe = 1;
} else
file = filp_open(corename,
- O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE, 0600);
+ O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE | flag,
+ 0600);
if (IS_ERR(file))
goto fail_unlock;
inode = file->f_dentry->d_inode
*******************************************************

You can see "flag" option is added in filp_open().

I compared kernel-2.6.19.1 to kernel-2.6.18-128(RHEL5), but kernel-2.6.18 is
not patched.

/linux-2.6.19.1/fs/exec.c
***************
int do_coredump(long signr, int exit_code, struct pt_regs * regs)
:
:

} else
file = filp_open(corename,
! O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE | flag,
! 0600);
***************

/linux-2.6.18-128/fs/exec.c
---------------
int do_coredump(long signr, int exit_code, struct pt_regs * regs)
:
:

}
} else
file = filp_open(corename,
! O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE, 0600);
!
---------------

Environment

  • Red Hat Enterprise Linux 5.3 x86_64/x86 with kernel-2.6.18-128.el5

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.