Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 4 Nov 2010 16:05:39 -0400 (EDT)
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: CVE request: kernel: kvm kernel stack leakage

"Structures kvm_vcpu_events, kvm_debugregs, kvm_pit_state2 and kvm_clock_data
are copied to userland with some padding and reserved fields unitialized.  It
leads to leaking of contents of kernel stack memory."

Upstream commit:
http://git.kernel.org/?p=virt/kvm/kvm.git;a=commit;h=831d9d02f9522e739825a51a11e3bc5aa531a905

Credit: Vasiliy Kulikov

Reference:
http://www.spinics.net/lists/kvm/msg44130.html
https://bugzilla.redhat.com/show_bug.cgi?id=649920

Thanks,
--
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.