All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring.
@ 2013-02-07  9:41 Ian Campbell
  0 siblings, 0 replies; 6+ messages in thread
From: Ian Campbell @ 2013-02-07  9:41 UTC (permalink / raw)
  To: netdev; +Cc: xen-devel

The Xen netback implementation contains a couple of flaws which can
allow a guest to cause a DoS in the backend domain, potentially
affecting other domains in the system.

CVE-2013-0216 is a failure to sanity check the ring producer/consumer
pointers which can allow a guest to cause netback to loop for an
extended period preventing other work from occurring.

CVE-2013-0217 is a memory leak on an error path which is guest
triggerable.

The following series contains the fixes for these issues, as previously
included in Xen Security Advisory 39:
http://lists.xen.org/archives/html/xen-announce/2013-02/msg00001.html

Changes in v2:
 - Typo and block comment format fixes 
 - Added stable Cc

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring.
  2013-02-08  4:31 ` David Miller
  2013-02-08  7:54   ` Ian Campbell
@ 2013-02-08  7:54   ` Ian Campbell
  1 sibling, 0 replies; 6+ messages in thread
From: Ian Campbell @ 2013-02-08  7:54 UTC (permalink / raw)
  To: David Miller; +Cc: netdev, xen-devel

On Fri, 2013-02-08 at 04:31 +0000, David Miller wrote:

> Applied, please don't add stable CC:'s to networking patches, instead
> ask me to queue it up to my -stable todo pile instead.

Thanks & Ack.

> I don't like it when patches instantly be submitted to -stable when
> they hit Linus's tree, I'd rather it soak upstream for a week or two
> instead.  That's why I do it this way.

Very reasonable.

Ian.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring.
  2013-02-08  4:31 ` David Miller
@ 2013-02-08  7:54   ` Ian Campbell
  2013-02-08  7:54   ` Ian Campbell
  1 sibling, 0 replies; 6+ messages in thread
From: Ian Campbell @ 2013-02-08  7:54 UTC (permalink / raw)
  To: David Miller; +Cc: netdev, xen-devel

On Fri, 2013-02-08 at 04:31 +0000, David Miller wrote:

> Applied, please don't add stable CC:'s to networking patches, instead
> ask me to queue it up to my -stable todo pile instead.

Thanks & Ack.

> I don't like it when patches instantly be submitted to -stable when
> they hit Linus's tree, I'd rather it soak upstream for a week or two
> instead.  That's why I do it this way.

Very reasonable.

Ian.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring.
  2013-02-07  9:41 Ian Campbell
@ 2013-02-08  4:31 ` David Miller
  2013-02-08  7:54   ` Ian Campbell
  2013-02-08  7:54   ` Ian Campbell
  2013-02-08  4:31 ` David Miller
  1 sibling, 2 replies; 6+ messages in thread
From: David Miller @ 2013-02-08  4:31 UTC (permalink / raw)
  To: Ian.Campbell; +Cc: netdev, xen-devel

From: Ian Campbell <Ian.Campbell@citrix.com>
Date: Thu, 7 Feb 2013 09:41:18 +0000

> The Xen netback implementation contains a couple of flaws which can
> allow a guest to cause a DoS in the backend domain, potentially
> affecting other domains in the system.
> 
> CVE-2013-0216 is a failure to sanity check the ring producer/consumer
> pointers which can allow a guest to cause netback to loop for an
> extended period preventing other work from occurring.
> 
> CVE-2013-0217 is a memory leak on an error path which is guest
> triggerable.
> 
> The following series contains the fixes for these issues, as previously
> included in Xen Security Advisory 39:
> http://lists.xen.org/archives/html/xen-announce/2013-02/msg00001.html
> 
> Changes in v2:
>  - Typo and block comment format fixes 
>  - Added stable Cc

Applied, please don't add stable CC:'s to networking patches, instead
ask me to queue it up to my -stable todo pile instead.

I don't like it when patches instantly be submitted to -stable when
they hit Linus's tree, I'd rather it soak upstream for a week or two
instead.  That's why I do it this way.

Thanks.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring.
  2013-02-07  9:41 Ian Campbell
  2013-02-08  4:31 ` David Miller
@ 2013-02-08  4:31 ` David Miller
  1 sibling, 0 replies; 6+ messages in thread
From: David Miller @ 2013-02-08  4:31 UTC (permalink / raw)
  To: Ian.Campbell; +Cc: netdev, xen-devel

From: Ian Campbell <Ian.Campbell@citrix.com>
Date: Thu, 7 Feb 2013 09:41:18 +0000

> The Xen netback implementation contains a couple of flaws which can
> allow a guest to cause a DoS in the backend domain, potentially
> affecting other domains in the system.
> 
> CVE-2013-0216 is a failure to sanity check the ring producer/consumer
> pointers which can allow a guest to cause netback to loop for an
> extended period preventing other work from occurring.
> 
> CVE-2013-0217 is a memory leak on an error path which is guest
> triggerable.
> 
> The following series contains the fixes for these issues, as previously
> included in Xen Security Advisory 39:
> http://lists.xen.org/archives/html/xen-announce/2013-02/msg00001.html
> 
> Changes in v2:
>  - Typo and block comment format fixes 
>  - Added stable Cc

Applied, please don't add stable CC:'s to networking patches, instead
ask me to queue it up to my -stable todo pile instead.

I don't like it when patches instantly be submitted to -stable when
they hit Linus's tree, I'd rather it soak upstream for a week or two
instead.  That's why I do it this way.

Thanks.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring.
@ 2013-02-07  9:41 Ian Campbell
  2013-02-08  4:31 ` David Miller
  2013-02-08  4:31 ` David Miller
  0 siblings, 2 replies; 6+ messages in thread
From: Ian Campbell @ 2013-02-07  9:41 UTC (permalink / raw)
  To: netdev; +Cc: xen-devel

The Xen netback implementation contains a couple of flaws which can
allow a guest to cause a DoS in the backend domain, potentially
affecting other domains in the system.

CVE-2013-0216 is a failure to sanity check the ring producer/consumer
pointers which can allow a guest to cause netback to loop for an
extended period preventing other work from occurring.

CVE-2013-0217 is a memory leak on an error path which is guest
triggerable.

The following series contains the fixes for these issues, as previously
included in Xen Security Advisory 39:
http://lists.xen.org/archives/html/xen-announce/2013-02/msg00001.html

Changes in v2:
 - Typo and block comment format fixes 
 - Added stable Cc

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2013-02-08  7:54 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-02-07  9:41 [PATCH v2 0/4] XSA-39 CVE-2013-021[67]: Linux netback DoS via malicious guest ring Ian Campbell
2013-02-07  9:41 Ian Campbell
2013-02-08  4:31 ` David Miller
2013-02-08  7:54   ` Ian Campbell
2013-02-08  7:54   ` Ian Campbell
2013-02-08  4:31 ` David Miller

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.