|
Message-ID: <alpine.LFD.2.20.1603041532360.19054@wniryva> Date: Fri, 4 Mar 2016 15:34:36 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: CVE request Qemu: rng-random: arbitrary stack based allocation leading to corruption Hello, Qemu emulator built with the Pseudo Random Number Generator(PRNG) back-end support is vulnerable to an arbitrary stack based allocation and memory corruption via random bytes issue. It could occur when a guest requests for entropy for random number generation. A user/process inside guest could use this flaw to crash the Qemu process resulting in DoS. Upstream patch: --------------- -> http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956 Reference: ---------- -> https://bugzilla.redhat.com/show_bug.cgi?id=1314676 Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.