Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 23 Sep 2016 09:48:07 +0000
From: Hu Chaojian <>
To: "" <>
Subject: CVE request Qemu: hw: net: Fix a heap overflow in

The .receive callback of xlnx.xps-ethernetlite doesn't check the length

of data before calling memcpy. As a result, the NetClientState object in
heap will be overflowed. Attackers may leverage it to execute arbitrary

code with privileges of the qemu process on the host.

Upstream patches:<>

This issue was discovered by chaojianhu<>


Chaojian Hu



Alistair (the code maintainer) have requested a cve id for this vulnerability.

>>Hello chaojianhu,

>>I created a CVE, but I can't access it. Do you know how to expose the CVE?




But there seems a small problem.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ