Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue,  8 Dec 2015 13:36:37 -0500 (EST)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, lianyihan@....cn
Subject: Re: CVE request: Qemu: ui: vnc: avoid floating point exception

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Qemu emulator built with the VNC display driver support is vulnerable to an
> arithmetic exception flaw. It occurs on the VNC server side while processing
> the 'SetPixleFormat' messages from a client.

We think SetPixleFormat is a typo of SetPixelFormat.

> A privileged remote client could use this flaw to crash the guest resulting in
> DoS.

> http://git.qemu.org/?p=qemu.git;a=commit;h=4c65fed8bdf96780735dbdb92a8bd0d6b6526cc3
> 
> ui: vnc: avoid floating point exception
> 
> While sending 'SetPixelFormat' messages to a VNC server,
> the client could set the 'red-max', 'green-max' and 'blue-max'
> values to be zero. This leads to a floating point exception in
> write_png_palette while doing frame buffer updates.
> 
> ui/vnc.c
> set_pixel_format

Use CVE-2015-8504.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0JpL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.