|
Message-Id: <20151208183637.6D2F742E0A8@smtpvbsrv1.mitre.org> Date: Tue, 8 Dec 2015 13:36:37 -0500 (EST) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, lianyihan@....cn Subject: Re: CVE request: Qemu: ui: vnc: avoid floating point exception -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > Qemu emulator built with the VNC display driver support is vulnerable to an > arithmetic exception flaw. It occurs on the VNC server side while processing > the 'SetPixleFormat' messages from a client. We think SetPixleFormat is a typo of SetPixelFormat. > A privileged remote client could use this flaw to crash the guest resulting in > DoS. > http://git.qemu.org/?p=qemu.git;a=commit;h=4c65fed8bdf96780735dbdb92a8bd0d6b6526cc3 > > ui: vnc: avoid floating point exception > > While sending 'SetPixelFormat' messages to a VNC server, > the client could set the 'red-max', 'green-max' and 'blue-max' > values to be zero. This leads to a floating point exception in > write_png_palette while doing frame buffer updates. > > ui/vnc.c > set_pixel_format Use CVE-2015-8504. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWZyLpAAoJEL54rhJi8gl5uUUP/ArhiKUMu9CInCLLiz8fo9Ou ey74+W5oaMoSwgP2PzCS6AbGj+ZK28t/8DbuhXz1FAJVChZlaa0v4yJkiw90B41g 1y8mI2CjB+vCgYPWF7Aqh8YqwlO3mY7XMflbvzmjKxUkdgYt5zha+dCmQ7P5Vet1 j+JZQkKZIU6VDnKQiUmvVz6BCtS7khsNYTFjqCs2F3PuUQnBZTKXjTxcO5tAcqcI 4wlLeB2QgJcZHRYcRkLAyfNpQ9IeJtzgqk5oc7Ms3gfwPzvQAxQYHH829aKPL7M9 GOe+fQH9ITuOlBohPNthAtNiZUq/A64nRKaZ4KekfR/6Hb2DWOKKMJ0injJflQaa h7zF+zwccF9Z2meEg6bKcJyfcL7J6Qb0BOvUpmN0sT2JLKmQJvH4M8svWmBj3FiX 7Vj/DixcbLdeokQOz42a8ph51sWeghHRPdy1wYh87Kxv51RzaOyjCtMTH7nk7ae4 jzKJDFcKy0+qEoj95qO9DvhdFFTCAu7A+YB4+KvfGaFospbW/1UeprRpCgVrEzY/ YTT2d9PnFbns4zXJHK+T5XhxrhxNbsP0FnQPhwAxg1ruroyCJBrAA5Zemah3rNwF HayZogYm0nkoEwnGB263CYI87fqOSZ+y4E/dXZVl37zttZ3ixqU764Z/2UAaSRea kVSLWiCTRm/Gg+o4PRgK =0JpL -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.