oss-sec mailing list archives
Re: CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing
From: P J P <ppandit () redhat com>
Date: Wed, 19 Dec 2018 10:55:55 +0530 (IST)
Hello Alex, +-- On Tue, 18 Dec 2018, Alex Gaynor wrote --+ | Can you say more about why this is only a DoS? The commit message sounds (to | someone with little domain expertise in KVM) like a fairly traditional | pattern for an exploitable for code exec uaf. That's right, it does have potential for more misuse, though it may not be as easy. I missed to mention that earlier. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
Current thread:
- CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing P J P (Dec 18)
- Re: CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing Alex Gaynor (Dec 18)
- Re: CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing P J P (Dec 18)
- Re: CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing Alex Gaynor (Dec 18)