Bug 459942

Summary: kernel: nf_nat: use secure_ipv4_port_ephemeral() for NAT port randomization [mrg-1]
Product: Red Hat Enterprise MRG Reporter: Eugene Teo (Security Response) <eteo>
Component: realtime-kernelAssignee: Red Hat Real Time Maintenance <rt-maint>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: 1.0CC: bhu, davids, lgoncalv, security-response-team, williams
Target Milestone: 1.0.3   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-10-07 19:20:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Upstream patch for this issue
none
Patch for MRG 2.6.24.7-79 none

Description Eugene Teo (Security Response) 2008-08-25 01:02:31 UTC
Description of problem:
Use incoming network tuple as seed for NAT port randomization. This avoids concerns of leaking net_random() bits, and also gives better port distribution.

Comment 2 Eugene Teo (Security Response) 2008-08-25 01:03:59 UTC
Created attachment 314889 [details]
Upstream patch for this issue

Comment 5 Luis Claudio R. Goncalves 2008-09-09 19:55:36 UTC
Created attachment 316250 [details]
Patch for MRG 2.6.24.7-79

Queued for -79

Comment 7 David Sommerseth 2008-09-24 08:43:35 UTC
Verified that the "Patch for MRG 2.6.24.7-79" (https://bugzilla.redhat.com/attachment.cgi?id=316250) is added in the mrg-rt-2.6.24.7-81 source tree.  mrg-rt.git commit 256fe604b0cec4145abe5d7ebacb92fef8709b5a

Comment 9 errata-xmlrpc 2008-10-07 19:20:30 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2008-0857.html