Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 17 Aug 2016 23:33:56 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, liqiang6-s@....cn
Subject: Re: CVE request Qemu: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support is
> vulnerable to an OOB read access. In that it does not check if packet headers
> does not check for IP header length. It could lead to a OOB access when
> reading further packet data.
> 
> https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html

>> I should have had marked it as "PATCH for v2.6.0"

This is not yet available at
http://git.qemu.org/?p=qemu.git;a=history;f=hw/net/vmxnet_tx_pkt.c;hb=stable-2.6
but that may be an expected place for a later update.

Use CVE-2016-6835 for this buffer over-read.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=/MUT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.