Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 5 Nov 2010 16:00:50 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com, Petr Matousek <pmatouse@...hat.com>
Cc: coley@...us.mitre.org
Subject: Re: CVE request: kernel: kvm kernel stack leakage

Please use CVE-2010-3881

Thanks.

-- 
    JB


----- "Petr Matousek" <pmatouse@...hat.com> wrote:

> "Structures kvm_vcpu_events, kvm_debugregs, kvm_pit_state2 and
> kvm_clock_data
> are copied to userland with some padding and reserved fields
> unitialized.  It
> leads to leaking of contents of kernel stack memory."
> 
> Upstream commit:
> http://git.kernel.org/?p=virt/kvm/kvm.git;a=commit;h=831d9d02f9522e739825a51a11e3bc5aa531a905
> 
> Credit: Vasiliy Kulikov
> 
> Reference:
> http://www.spinics.net/lists/kvm/msg44130.html
> https://bugzilla.redhat.com/show_bug.cgi?id=649920
> 
> Thanks,
> --
> Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.