Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <51A64260.1020306@redhat.com>
Date: Wed, 29 May 2013 12:01:04 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Richard W.M. Jones" <rjones@...hat.com>,
        Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0
 | 1.23.0 <= X < 1.22.1 | 1.23.1): Denial of service due to a double-free
 when inspecting certain guest files / images

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/29/2013 06:25 AM, Richard W.M. Jones wrote:
> On Wed, May 29, 2013 at 08:21:42AM -0400, Jan Lieskovsky wrote:
>> Hello Kurt, Steve, vendors,
>> 
>> LibguestFS upstream has issued the following patch: [1]
>> https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd
>>
>>
>> 
to correct a double-free flaw in the virt-inspector / other virt-* tools,
>> which could lead to denial of service if some of the tools were
>> used by 3rd party applications for inspection of untrusted guest
>> files / images:
>> 
>> [2]
>> https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html
>>
>> 
[3] https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html
>> 
>> Could you allocate a CVE identifier for this?

Please use CVE-2013-2124 for this issue.

> Small adjustment to the subject line.
> 
> Just to be clear this affects:
> 
> 1.20.x, x <= 6 1.21.x, all x (this is an obsolete development
> branch) 1.22.0 1.23.0
> 
> NOT affected are:
> 
> anything < 1.20 1.20.7 (fix backported to this stable version
> yesterday) 1.22.1 (fix backported to this stable version
> yesterday) 1.23.1 (this is the upstream version, fixed yesterday)
> 
> Credit for finding the bug goes to the Coverity static analyzer.
> 
> Rich.
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=j0HU
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.