Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 15 Jul 2013 13:58:05 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- Linux kernel: vhost-net: use-after-free
 in vhost_net_flush

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/15/2013 01:53 PM, Petr Matousek wrote:
> vhost_net_ubuf_put_and_wait has a confusing name: it will actually
> also free it's argument. vhost_net_flush tries to use the argument
> after passing it to vhost_net_ubuf_put_and_wait, this results in
> use after free.
> 
> Upstream fix: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd7633ecd553a5e304d349aa6f8eb8a0417098c5
>
>  Introduced by: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1280c27f8e29acf4af2da914e80ec27c3dbd5c01
>
>  Introduced in upstream version: v3.8-rc1
> 
> References: https://bugzilla.redhat.com/show_bug.cgi?id=984722 
> https://bugzilla.redhat.com/show_bug.cgi?id=980643 
> http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?h=f19&id=da4ebd83da1869778909f394f6ebd50850ef5fec
>
> 
Please use CVE-2013-4127  for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=k0v2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ