Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 15 Jul 2013 13:58:05 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- Linux kernel: vhost-net: use-after-free
 in vhost_net_flush

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/15/2013 01:53 PM, Petr Matousek wrote:
> vhost_net_ubuf_put_and_wait has a confusing name: it will actually
> also free it's argument. vhost_net_flush tries to use the argument
> after passing it to vhost_net_ubuf_put_and_wait, this results in
> use after free.
> 
> Upstream fix: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd7633ecd553a5e304d349aa6f8eb8a0417098c5
>
>  Introduced by: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1280c27f8e29acf4af2da914e80ec27c3dbd5c01
>
>  Introduced in upstream version: v3.8-rc1
> 
> References: https://bugzilla.redhat.com/show_bug.cgi?id=984722 
> https://bugzilla.redhat.com/show_bug.cgi?id=980643 
> http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?h=f19&id=da4ebd83da1869778909f394f6ebd50850ef5fec
>
> 
Please use CVE-2013-4127  for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=k0v2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.