Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 18 Apr 2014 02:57:18 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> An out of bounds memory access flaw was found in Qemu's IDE device model. It
> leads to Qemu's memory corruption via buffer overwrite(4 bytes). It occurs
> while executing IDE SMART commands.
> 
> A guest's user could use this flaw to corrupt Qemu process's memory on the
> host.
> 
> https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html

Use CVE-2014-2894.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTUMuTAAoJEKllVAevmvmsXfsH+wfnzHlKRV9fAWjgGXj1lmCL
jjjS9vPHJgDGstCzDsq0fVDilwye2+1zWmHKJ1J56fWgOhwQJqvLelSL6teLNW44
4He7QyA0FynTTuv1G7sFqlEzF9PpnpwBPbIVmZgWy4pSFehz1BSps3YajStquCA1
4qiDddNKmeu3qMfBin5V+KZjVZLRc8Whg0k3JHhVu4Ua77lx+l4V4VworNQtxPOI
ixxGQeHMi/tWY3fUcPfaA6fOrpYT/f+bmNGpE1IvPtevAeA6xHO1JaXb0ykVKCT+
i0B0OayXm7yGZRDbqGFWlPX2l/EtZXE+5ymSgPf5iaIWcqS2dDdeeaQZ6UBAqNE=
=BERj
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.