Bug 790940 (CVE-2012-0862)
Summary: | CVE-2012-0862 xinetd: enables unintentional services over tcpmux port | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jko, jskeoch, jsynacek, mthapa, pvn, security-response-team, thomas.swan |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | xinetd 2.3.15 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-10-01 04:46:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 788795, 801755, 801756, 801757, 820318, 883653, 955663 | ||
Bug Blocks: | 790944, 855229, 952520 | ||
Attachments: |
Description
Vincent Danen
2012-02-15 19:10:31 UTC
Acknowledgements: Red Hat would like to thank Thomas Swan of FedEx for reporting this issue. Created attachment 583311 [details] Patch for CVE-2012-0862 as provided by Thomas Swan of FedEx. Reviewed by a former xinetd upstream maintainer and the current Red Hat xinetd maintainer. Now public via: http://www.openwall.com/lists/oss-security/2012/05/09/5 Created xinetd tracking bugs for this issue Affects: fedora-all [bug 820318] Already fixed in f17 and f18 by http://lists.fedoraproject.org/pipermail/scm-commits/2012-May/781809.html This is corrected in upstream 2.3.15. xinetd-2.3.14-47.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. xinetd-2.3.14-37.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0499 https://rhn.redhat.com/errata/RHSA-2013-0499.html GSS are requesting further information regards the ETA for this update being provided to RHEL 5, can you contact John Jong Bae Ko <jko> and provide additional details. I am setting need info but please contact John directly as he does not have visibility of this BZ. John Created attachment 799731 [details]
updated, simpler patch
I believe that child_process not exec_server should be called. This does not affect the existing behaviour of other exec_server calls.
disregard last update and patch. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1302 https://rhn.redhat.com/errata/RHSA-2013-1302.html Statement: Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This flaw has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. |