First published: Wed Nov 07 2007(Updated: )
Description of problem: The blkif_get_x86_32_req() and blkif_get_x86_64_req() functions don't sanity-check the req->nr_segments value. The functions are part of the 32-on-64 support. They translate block I/O request structs from 32bit ABI to 64bit ABI and visa versa. They are used in case 32bit paravirtualized guests (or 32bit hvm guests with pv-on-hvm drivers installed) are running on a 64bit host. Version-Release number of selected component (if applicable): RHEL 5.1 kernel.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5498 has a medium severity rating due to the potential for denial of service in specific circumstances.
To fix CVE-2007-5498, update the Linux kernel to a version higher than 2.6.18 where the vulnerability is patched.
CVE-2007-5498 affects systems running Linux kernel version 2.6.18 and is particularly relevant for those using the 32-on-64 support.
Systems using the Linux kernel version 2.6.18 are vulnerable to CVE-2007-5498.
While CVE-2007-5498 mainly poses a risk of denial of service, it could indirectly lead to data loss if a service interruption occurs.