Bug 772867 (CVE-2012-0207) - CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Summary: CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IG...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0207
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 772868 772869 772870 772871 772872 772873 781214 782684
Blocks: 772863
TreeView+ depends on / blocked
 
Reported: 2012-01-10 07:58 UTC by Eugene Teo (Security Response)
Modified: 2023-05-11 18:23 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-24 07:41:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0107 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2012-02-09 21:37:09 UTC
Red Hat Product Errata RHSA-2012:0168 0 normal SHIPPED_LIVE Important: rhev-hypervisor5 security and bug fix update 2012-02-21 10:01:32 UTC
Red Hat Product Errata RHSA-2012:0333 0 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2012-02-24 01:21:35 UTC
Red Hat Product Errata RHSA-2012:0350 0 normal SHIPPED_LIVE Moderate: kernel security and bug fix update 2012-03-06 23:43:05 UTC
Red Hat Product Errata RHSA-2012:0422 0 normal SHIPPED_LIVE Moderate: rhev-hypervisor6 security and bug fix update 2012-03-26 19:17:12 UTC

Description Eugene Teo (Security Response) 2012-01-10 07:58:32 UTC
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP behavior on v3 query during v2-compatibility mode') added yet another case for query parsing, which can result in max_delay = 0.  Substitute a value of 1, as in the usual v3 case.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654876

code added in 2.6.36-rc8.

Upstream commit:
http://git.kernel.org/linus/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27

Acknowledgements:

Red Hat would like to thank Simon McVittie for reporting this issue.

Comment 3 Eugene Teo (Security Response) 2012-01-10 08:09:35 UTC
Statement:

This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 5b7c8406.

Comment 7 Eugene Teo (Security Response) 2012-01-18 07:10:22 UTC
Created kernel tracking bugs for this issue

Affects: fedora-all [bug 782684]

Comment 10 errata-xmlrpc 2012-02-09 16:42:13 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0107 https://rhn.redhat.com/errata/RHSA-2012-0107.html

Comment 11 errata-xmlrpc 2012-02-21 05:06:01 UTC
This issue has been addressed in following products:

  RHEV-H, V2V and Agents for RHEL-5

Via RHSA-2012:0168 https://rhn.redhat.com/errata/RHSA-2012-0168.html

Comment 12 errata-xmlrpc 2012-02-23 20:23:59 UTC
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2012:0333 https://rhn.redhat.com/errata/RHSA-2012-0333.html

Comment 13 errata-xmlrpc 2012-03-06 18:46:04 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0350 https://rhn.redhat.com/errata/RHSA-2012-0350.html

Comment 14 errata-xmlrpc 2012-03-26 15:18:05 UTC
This issue has been addressed in following products:

  RHEV-H and Agents for RHEL-6

Via RHSA-2012:0422 https://rhn.redhat.com/errata/RHSA-2012-0422.html


Note You need to log in before you can comment on or make changes to this bug.