CVE-2006-6304 affect kernel on RHEL5?
Issue
- According to the CVE info, these are kernel 2.6.19 issue, so it looks that these does not affect RHEL5. However, the relevant code looks to be included in RHEL5.
- This issue's patch info is written at http://www.mail-archive.com/linux-kernel@vger.kernel.org/msg102611.html
*******************************************************
--- linux-2.6.19.orig/fs/exec.c
+++ linux-2.6.19/fs/exec.c
@@ -1515,7 +1515,8 @@ int do_coredump(long signr, int exit_cod
ispipe = 1;
} else
file = filp_open(corename,
- O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE, 0600);
+ O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE | flag,
+ 0600);
if (IS_ERR(file))
goto fail_unlock;
inode = file->f_dentry->d_inode
*******************************************************
You can see "flag" option is added in filp_open().
I compared kernel-2.6.19.1 to kernel-2.6.18-128(RHEL5), but kernel-2.6.18 is
not patched.
/linux-2.6.19.1/fs/exec.c
***************
int do_coredump(long signr, int exit_code, struct pt_regs * regs)
:
:
} else
file = filp_open(corename,
! O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE | flag,
! 0600);
***************
/linux-2.6.18-128/fs/exec.c
---------------
int do_coredump(long signr, int exit_code, struct pt_regs * regs)
:
:
}
} else
file = filp_open(corename,
! O_CREAT | 2 | O_NOFOLLOW | O_LARGEFILE, 0600);
!
---------------
Environment
- Red Hat Enterprise Linux 5.3 x86_64/x86 with kernel-2.6.18-128.el5
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
