Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20130601165401.GH17379@outflux.net>
Date: Sat, 1 Jun 2013 09:54:01 -0700
From: Kees Cook <keescook@...omium.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2013-2850: Linux kernel iSCSI target heap overflow

I found an unauthenticated remote heap buffer overflow in the Linux
iSCSI target subsystem. If there is a target configured and listening
on the network, a remote attacker can corrupt heap memory, and almost
certainly gain kernel execution control. I only got as far as proving
it could Oops the server.

It has been fixed in the upstream iscsi tree:

http://git.kernel.org/cgit/linux/kernel/git/nab/target-pending.git/commit/?id=cea4dcfdad926a27a18e188720efe0f2c9403456

A follow-up has been posted fixing similar anti-pattern uses of
strncpy(dst, src, strlen(src)) in the rest of the kernel:

https://lkml.org/lkml/2013/5/31/406

Thanks,

-Kees

-- 
Kees Cook
Chrome OS Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.