Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 22 Aug 2014 15:25:42 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Qemu: out of bounds memory access

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://lists.gnu.org/archive/html/qemu-devel/2014-08/msg03338.html

> A user with a custom PCI device could use this flaw to leak qemu process'
> memory bytes or corrupt them on the host.

(the patch is not available at
http://git.qemu.org/?p=qemu.git;a=history;f=hw/acpi/pcihp.c yet)

Use CVE-2014-5388 for this off-by-one error with impacts of
both memory corruption and information disclosure.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJT95jhAAoJEKllVAevmvmssUQH/3c+qdnt7Yh6wTCegmKMxPmP
TYEc2XcdQPCtb4XKwn3ND2PE00xLjtmRqmWVcXgdlhgXs2j1NNq5FvPdPuXz99Kh
tXXAmAB7Kq9I8TYeZ6RARYd5eWHKzXQvXAU7rIWlIx6QkvzIW+MmMW7OmHLwRBh7
yoRqQ6tEIZfG1zN3UcG34H70Ke44efe9sDjrbq5UsuLX01uQV1CM4aJlIx75OJit
QKXsME/0BJYPUqMojzUvT2H/Ddn2rdMpGE9lgVZ902rK214L/qmahLi3ZxDvvgz6
urfSafRkuausMFVuATy2Xr9wa1bzV6pJCUlZFtXm0euJSQxv0DdHSD5PFyTyOtM=
=eBq9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.