|
Message-ID: <20140320182032.GC20297@dhcp-25-225.brq.redhat.com> Date: Thu, 20 Mar 2014 19:20:32 +0100 From: Petr Matousek <pmatouse@...hat.com> To: oss-security@...ts.openwall.com Cc: zoltan.kiss@...rix.com, Michael Tsirkin <mtsirkin@...hat.com> Subject: CVE request -- kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied An information flaw was found in the way skb_zerocopy() copied skbs that are backed by userspace buffers (for example vhost-net and recent xen netback). Once the source skb is consumed, ubuf destructor is called and potentially releases the corresponding userspace buffers, which can then for example be repurposed, while the destination skb is still pointing to the them. This issue is similar to CVE-2014-0131. Upstream patch: https://lkml.org/lkml/2014/3/20/421 Thanks, -- Petr Matousek / Red Hat Security Response Team PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3 D874 3E78 6F42 C449 77CA
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.