Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 4 Mar 2016 15:34:36 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: CVE request Qemu: rng-random: arbitrary stack based allocation
 leading to corruption

   Hello,

Qemu emulator built with the Pseudo Random Number Generator(PRNG) back-end 
support is vulnerable to an arbitrary stack based allocation and memory 
corruption via random bytes issue. It could occur when a guest requests for 
entropy for random number generation.

A user/process inside guest could use this flaw to crash the Qemu process 
resulting in DoS.

Upstream patch:
---------------
   -> http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956

Reference:
----------
   -> https://bugzilla.redhat.com/show_bug.cgi?id=1314676

Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.