Date: Wed, 29 May 2013 13:25:23 +0100 From: "Richard W.M. Jones" <rjones@...hat.com> To: Jan Lieskovsky <jlieskov@...hat.com> Cc: oss-security@...ts.openwall.com, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 <= X < 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images On Wed, May 29, 2013 at 08:21:42AM -0400, Jan Lieskovsky wrote: > Hello Kurt, Steve, vendors, > > LibguestFS upstream has issued the following patch: >  https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd > > to correct a double-free flaw in the virt-inspector / other virt-* tools, > which could lead to denial of service if some of the tools were used by > 3rd party applications for inspection of untrusted guest files / images: > >  https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html >  https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html > > Could you allocate a CVE identifier for this? Small adjustment to the subject line. Just to be clear this affects: 1.20.x, x <= 6 1.21.x, all x (this is an obsolete development branch) 1.22.0 1.23.0 NOT affected are: anything < 1.20 1.20.7 (fix backported to this stable version yesterday) 1.22.1 (fix backported to this stable version yesterday) 1.23.1 (this is the upstream version, fixed yesterday) Credit for finding the bug goes to the Coverity static analyzer. Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones libguestfs lets you edit virtual machines. Supports shell scripting, bindings from many languages. http://libguestfs.org
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.