|
Message-Id: <20151214213603.C609342E414@smtpvbsrv1.mitre.org> Date: Mon, 14 Dec 2015 16:36:03 -0500 (EST) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, luodalongde@...il.com, kraxel@...hat.com Subject: Re: CVE request Qemu: usb: infinite loop in ehci_advance_state results in DoS -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > Qemu emulator built with the USB EHCI emulation support is vulnerable to an > infinite loop issue. It occurs during communication between host controller > interface(EHCI) and a respective device driver. These two communicate via a > isochronous transfer descriptor list(iTD) and an infinite loop unfolds if > there is a closed loop in this list. > > A privileges user inside guest could use this flaw to consume excessive CPU > cycles & resources on the host. > > https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html >> Make ehci_process_itd return an error in case we didn't do any actual >> iso transfer because we've found no active transaction. That'll avoid >> ehci happily run in circles forever if the guest builds a loop out of >> idts. Use CVE-2015-8558. This is not yet available at http://git.qemu.org/?p=qemu.git;a=history;f=hw/usb/hcd-ehci.c but that may be an expected place for a later update. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWbzQFAAoJEL54rhJi8gl5bzsP+wRW39K2IWq1yUu33k4+PoGY 7dn74LzPgXlOq96r9orJCMluP8FPh6yPL/VavV8gbCZgGRf/+n0KEUBejP8wYhlJ +CQPwjMihev8RxDKPz2rMHDohmqnV9N4myzZudRecqcqJ9X8rYZ3T1Ycth2Qz5V+ Y6BdKBgWPGN1gNIltY3+eSyKc2XdU24MGkLF8iuzFwDw2Ab0eVGWMbOUM+yT5qNg q6FHIhlorQ0Yz4tcaaWaPusrMIsb2q9RneTNSv6K0C53Ijgn3ieJmhqKvE0stJRi fHQGtx0audvjL7Rs2sA35u2wChZ7MFREUe4iUY8WSRcEI7IOrXeyMl83dRHpI6c6 NbdI6LxUKow4XvlGj+wxwszQBx8+68plscXWze47WSre+fY/3CErZxKL/ImaQtjm 6fAx5Qtu13x0wDMQacmgMdAV6T+rmQH+n7rTJmlpp/gCdAsasQayhsDvu2ojBXQS nq/cKW7QFkX1bhhNcWGNgMv3D7bxBTwMloor02S/M5XoDEuPFElAGkrVUpC4N6+E PKCgUO7NLIVvbfeAb+Fo3hhfLV/vk8gvRrHRst/y2cI+mFhyjLdDp7ODsJNNmnba ZP2cedyD6m3Jx1XO9vNINCCOQUFFtNEdvZ0nscrZdH4//lmLFGC4DbiYI02ErCfZ ePPfPwCfoyUudwySQKR+ =fJuc -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.