Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 21 Apr 2015 12:07:49 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Qemu: malicious PRDT flow from guest to host

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> http://git.qemu.org/?p=qemu.git;a=commit;h=3251bdcf1c67427d964517053c3d185b46e618e8

>> A privileged user inside guest could use this flaw to crash the system,
>> resulting in DoS.

> |   1A: one CVE ID for the use of "return s->io_buffer_size != 0" - this
> |       made it impossible for other parts of the code to distinguish
> |       between the "0 bytes" case and the "0 complete sectors" case,
> |       and caused both impacts: "leaked memory for short PRDTs" and
> |       "infinite loops and resource usage"

Use CVE-2014-9718.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVNnVTAAoJEKllVAevmvms0B0H/RzX6rXmwAwPdSsbHlTfpzKy
Kusz9igrWRwcDnymK6n+I7zcz7Faf5k4TH7TYW3l+aNsuVbxy9WDKJBS4l6zTdst
s3OBdCr9JaQyQc9iPcaBqa3BzZuWHrkAaa/m5oc2hPigziom2o16Tf04WHAQyJeb
4BASKG/VCZYPEt9K8Yg4+ib3cjfO4FeC3gcfqMZqrE2ICXGpkYDPlgtRi0OSqpAl
Z/ROodVc2YvBulQYt61Og1AOIXbdd1RM6NYsKWJNzcCtTaD1RUGOHt1TCuKao1Rx
fKruqHAXok9G+Vs0BU0jPPzZx7mkadygxkeKcqh4l8nKVWBQakWFv9xeTFp9uTA=
=OypJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.