Kees Cook cea4dcfdad iscsi-target: fix heap buffer overflow on error
If a key was larger than 64 bytes, as checked by iscsi_check_key(), the
error response packet, generated by iscsi_add_notunderstood_response(),
would still attempt to copy the entire key into the packet, overflowing
the structure on the heap.

Remote preauthentication kernel memory corruption was possible if a
target was configured and listening on the network.

CVE-2013-2850

Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: stable@vger.kernel.org
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
2013-05-30 18:07:54 -07:00
..
2013-04-26 22:30:25 +02:00
2013-05-09 10:11:08 -07:00
2013-05-09 09:59:16 -07:00
2013-05-06 13:07:33 +02:00
2013-05-09 09:59:16 -07:00
2013-05-06 14:59:13 -07:00
2013-05-09 09:59:16 -07:00
2013-04-16 00:39:41 +02:00
2013-05-15 10:58:22 -07:00
2013-05-09 10:21:44 -07:00
2013-05-07 14:04:56 -07:00
2013-05-07 14:02:00 -07:00
2013-05-02 14:02:32 -07:00
2013-05-04 12:31:18 -07:00
2013-05-04 12:31:18 -07:00