Bug 237343 (CVE-2007-1321)
| Summary: | CVE-2007-1321 xen QEMU NE2000 emulation issues | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Marcel Holtmann <holtmann> | ||||
| Component: | vulnerability | Assignee: | Don Dutile (Red Hat) <ddutile> | ||||
| Status: | CLOSED CURRENTRELEASE | QA Contact: | |||||
| Severity: | low | Docs Contact: | |||||
| Priority: | low | ||||||
| Version: | unspecified | CC: | clalance, kreilly, security-response-team, xen-maint | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2009-10-22 14:59:01 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 237468, 296271, 296281 | ||||||
| Bug Blocks: | |||||||
| Attachments: |
|
||||||
|
Description
Marcel Holtmann
2007-04-20 21:46:31 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. public via http://taviso.decsystem.org/virtsec.pdf The severity of these NE2000 issues is probably low (or none at all) since since xen uses the rtl8139 driver by default. Created attachment 222511 [details]
was the proposed patch for all the issues (so includes these 3 too)
For clarity, the CVE-2007-1321 as fixed in RHSA-2007:0323 applies to this single issue: * QEMU NE2000 "receive" integer signedness error Nonsensical values in specific device registers can result in sanity checks being bypassed, an integer overflowing and attacker controlled data overflowing a heap buffer. It is likely the other two issues mentioned will get their own CVE names, of which only one applies to Xen (and is also impact=low) and therefore we will create a new tracking bug for that once allocated. OK, here's the matrix of problems and fixes (O means the fix is present, X mean
it isn't present, and NA means not applicable):
"mtu" heap "net socket" heap "receive" integer signedness
----------------------------------------------------------------
5.0.z | NA | X | O
5.1 | NA | X | O
upstream Qemu | X | X | O
upstream Xen | NA | X | O
So in summary, we have the fixes for problem 3; 1 doesn't apply to us; and 2 is
still a problem, although a low priority one, in all of the upstream projects as
well as 5.0.z and 5.1.
Chris Lalancette
All of the bugs depending on this one were closed -> errata long ago. Closing this tracking bug. Chris Lalancette |