Bug 237343 (CVE-2007-1321)
Summary: | CVE-2007-1321 xen QEMU NE2000 emulation issues | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marcel Holtmann <holtmann> | ||||
Component: | vulnerability | Assignee: | Don Dutile (Red Hat) <ddutile> | ||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | clalance, kreilly, security-response-team, xen-maint | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2009-10-22 14:59:01 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 237468, 296271, 296281 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Marcel Holtmann
2007-04-20 21:46:31 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. public via http://taviso.decsystem.org/virtsec.pdf The severity of these NE2000 issues is probably low (or none at all) since since xen uses the rtl8139 driver by default. Created attachment 222511 [details]
was the proposed patch for all the issues (so includes these 3 too)
For clarity, the CVE-2007-1321 as fixed in RHSA-2007:0323 applies to this single issue: * QEMU NE2000 "receive" integer signedness error Nonsensical values in specific device registers can result in sanity checks being bypassed, an integer overflowing and attacker controlled data overflowing a heap buffer. It is likely the other two issues mentioned will get their own CVE names, of which only one applies to Xen (and is also impact=low) and therefore we will create a new tracking bug for that once allocated. OK, here's the matrix of problems and fixes (O means the fix is present, X mean it isn't present, and NA means not applicable): "mtu" heap "net socket" heap "receive" integer signedness ---------------------------------------------------------------- 5.0.z | NA | X | O 5.1 | NA | X | O upstream Qemu | X | X | O upstream Xen | NA | X | O So in summary, we have the fixes for problem 3; 1 doesn't apply to us; and 2 is still a problem, although a low priority one, in all of the upstream projects as well as 5.0.z and 5.1. Chris Lalancette All of the bugs depending on this one were closed -> errata long ago. Closing this tracking bug. Chris Lalancette |