Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201405131805.s4DI59lb006269@linus.mitre.org>
Date: Tue, 13 May 2014 14:05:09 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Qemu: usb: fix up post load checks

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://article.gmane.org/gmane.comp.emulators.qemu/272322

Here, it appears that the only security fix to
http://git.qemu.org/?p=qemu.git;a=blob;f=hw/usb/bus.c;h=e48b19fc29bd9f831cc05990be73ddf49936d6a9;hb=HEAD
is the insertion of the "dev->setup_index > dev->setup_len" test. In
other words, although the patch corresponds to two bug discoverers,
only one discoverer found a security problem.

To clarify: we are currently interpreting "dev->setup_len ==
sizeof(dev->data_buf) seems fine, no need to fail migration" to mean
that "dev->setup_len >= sizeof(dev->data_buf)" is too strict a test,
and "dev->setup_len > sizeof(dev->data_buf)" is sufficient. It does
not imply that an attacker can cross privilege boundaries and cause a
denial of service (i.e., a failed migration) by triggering the
"dev->setup_len == sizeof(dev->data_buf)" condition.

The "dev->setup_index >= sizeof(dev->data_buf)" test was also removed.
Similarly, we are interpreting this to mean that that test is
superfluous. We are not interpreting this to mean that that test had
allowed a denial of service attack.

Use CVE-2014-3461 for the "When state is DATA, passing index > len
will cause memcpy with negative length, resulting in heap overflow"
issue.

Note that a related recent commit:

  http://git.qemu.org/?p=qemu.git;a=commit;h=9f8e9895c504149d7048e9fc5eb5cbb34b16e49a

has a CVE-2013-4541 assignment from Red Hat. See

  https://bugzilla.redhat.com/show_bug.cgi?id=1066384

The http://article.gmane.org/gmane.comp.emulators.qemu/272322 patch
represents additional changes needed after that CVE-2013-4541 fix.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTcl5nAAoJEKllVAevmvmsgNMH/j/HABgwfnPX0rv8zn12h4w4
7Dybeu2XO7tUy3JrMZdz+DyUY5hu/4dk3/egKSTrRHsS0azm72+OmbI7m0Rxanke
VvPcq7BJQuEZwNRUx8WplUUIVrBP4qz3kodSny/Rv5fsMdp8nWGl9GoR8HCZ/6m2
ffIb42sI3dGvmo8fyZPt0seSbZ0gp4H5YUlNlI5GMxJgl6CEOyiv5qp+GqvGnfyB
MUcwRL05C1pTVdW19gwAnaJsJr8OF5GqKIAXoGbcee4GV5dMAyxex5nw4J5liL7V
L1sJq71MsnjG5+wlyyeHd/1iTpeU9bVpkYQCs1+2XI/CF/eEIV0wZguawgSbeZg=
=TKjZ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.