Bug 454566
| Summary: | kernel: randomize udp port allocation | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Eugene Teo (Security Response) <eteo> | ||||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||||||
| Severity: | high | Docs Contact: | |||||||||||
| Priority: | high | ||||||||||||
| Version: | unspecified | CC: | dhoward, lwang, mjc, nobody, rkhan, skakar, vgoyal | ||||||||||
| Target Milestone: | --- | ||||||||||||
| Target Release: | --- | ||||||||||||
| Hardware: | All | ||||||||||||
| OS: | Linux | ||||||||||||
| Whiteboard: | |||||||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||||||
| Doc Text: | Story Points: | --- | |||||||||||
| Clone Of: | Environment: | ||||||||||||
| Last Closed: | 2015-09-02 17:43:36 UTC | Type: | --- | ||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||
| Documentation: | --- | CRM: | |||||||||||
| Verified Versions: | Category: | --- | |||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
| Embargoed: | |||||||||||||
| Bug Depends On: | 454567, 454568, 454569, 454570, 454571, 454572, 454961, 458325 | ||||||||||||
| Bug Blocks: | 449345 | ||||||||||||
| Attachments: |
|
||||||||||||
|
Description
Eugene Teo (Security Response)
2008-07-09 02:03:49 UTC
Proposed upstream patch: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=32c1da70810017a98aa6c431a5494a302b6b9a30 Created attachment 311337 [details]
Upstream patch for this issue
Implementing this would mitigate CVE-2008-1447 as applied to the glibc stub resolver. Created attachment 311378 [details]
Proposed backported patch for RHEL-4.8
Created attachment 311379 [details]
Proposed backported patch for RHEL-5.3
Created attachment 311434 [details]
Proposed backported patch for RHEL-2.1
Created attachment 311435 [details]
Proposed backported patch for RHEL-3.9
Whilst we're providing updates for Red Hat Enterprise Linux 4 and 5 to backport this functionality we have not labeled them as a security fix because they're only a partial help towards mitigation. The glibc stub resolver is not a recursive resolver and therefore is not affected directly by the recent DNS exploits (which rely on a caching recursive resolver). Different attacks against stub resolvers may still be possible, but for the most part an attacker would need to be on a local network and would be likely to be able to perform other attacks more easily. |