Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 20 Jan 2017 22:25:27 -0500
From: <cve-assign@...re.org>
To: <ppandit@...hat.com>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>,
	<liqiang6-s@....cn>
Subject: Re: CVE request Qemu: watchdog: memory leakage in virtual hardware watchdog wdt_i6300esb

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> [] Quick Emulator(Qemu) built with the virtual hardware watchdog 'wdt_i6300esb'
> support is vulnerable to a memory leakage issue. It could occur while doing a
> device unplug operation; Doing so repeatedly would result in leaking host
> memory, affecting other services on the host.
> 
> A privileged user inside guest could use this flaw to cause a DoS and/or
> potentially crash the Qemu process on the host.
> 
> https://lists.nongnu.org/archive/html/qemu-devel/2016-12/msg03104.html
> https://bugzilla.redhat.com/show_bug.cgi?id=1415199
> http://git.qemu.org/?p=qemu.git;a=commit;h=eb7a20a3616085d46aa6b4b4224e15587ec67e6e

Use CVE-2016-10155 for this (i.e., a memory consumption issue, not an
information disclosure issue).

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=UoYR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.