Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 1 Jun 2013 09:54:01 -0700
From: Kees Cook <>
Subject: CVE-2013-2850: Linux kernel iSCSI target heap overflow

I found an unauthenticated remote heap buffer overflow in the Linux
iSCSI target subsystem. If there is a target configured and listening
on the network, a remote attacker can corrupt heap memory, and almost
certainly gain kernel execution control. I only got as far as proving
it could Oops the server.

It has been fixed in the upstream iscsi tree:

A follow-up has been posted fixing similar anti-pattern uses of
strncpy(dst, src, strlen(src)) in the rest of the kernel:



Kees Cook
Chrome OS Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ