Bug 454566
Summary: | kernel: randomize udp port allocation | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Eugene Teo (Security Response) <eteo> | ||||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||||||
Severity: | high | Docs Contact: | |||||||||||
Priority: | high | ||||||||||||
Version: | unspecified | CC: | dhoward, lwang, mjc, nobody, rkhan, skakar, vgoyal | ||||||||||
Target Milestone: | --- | ||||||||||||
Target Release: | --- | ||||||||||||
Hardware: | All | ||||||||||||
OS: | Linux | ||||||||||||
Whiteboard: | |||||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||||
Doc Text: | Story Points: | --- | |||||||||||
Clone Of: | Environment: | ||||||||||||
Last Closed: | 2015-09-02 17:43:36 UTC | Type: | --- | ||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||
Documentation: | --- | CRM: | |||||||||||
Verified Versions: | Category: | --- | |||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
Embargoed: | |||||||||||||
Bug Depends On: | 454567, 454568, 454569, 454570, 454571, 454572, 454961, 458325 | ||||||||||||
Bug Blocks: | 449345 | ||||||||||||
Attachments: |
|
Description
Eugene Teo (Security Response)
2008-07-09 02:03:49 UTC
Proposed upstream patch: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=32c1da70810017a98aa6c431a5494a302b6b9a30 Created attachment 311337 [details]
Upstream patch for this issue
Implementing this would mitigate CVE-2008-1447 as applied to the glibc stub resolver. Created attachment 311378 [details]
Proposed backported patch for RHEL-4.8
Created attachment 311379 [details]
Proposed backported patch for RHEL-5.3
Created attachment 311434 [details]
Proposed backported patch for RHEL-2.1
Created attachment 311435 [details]
Proposed backported patch for RHEL-3.9
Whilst we're providing updates for Red Hat Enterprise Linux 4 and 5 to backport this functionality we have not labeled them as a security fix because they're only a partial help towards mitigation. The glibc stub resolver is not a recursive resolver and therefore is not affected directly by the recent DNS exploits (which rely on a caching recursive resolver). Different attacks against stub resolvers may still be possible, but for the most part an attacker would need to be on a local network and would be likely to be able to perform other attacks more easily. |