Back to bug 1325129
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-04-08 11:21:39 UTC | CC | security-response-team | |
| Red Hat Bugzilla | 2016-04-08 11:21:39 UTC | Doc Type | --- | Bug Fix |
| Adam Mariš | 2016-04-08 11:23:19 UTC | Blocks | 1325130 | |
| Adam Mariš | 2016-04-08 11:25:13 UTC | CC | kraxel | |
| John Skeoch | 2016-04-18 07:38:54 UTC | CC | yeylon | srevivo |
| Prasad Pandit | 2016-04-18 11:30:02 UTC | CC | prasad | |
| Prasad Pandit | 2016-04-18 11:35:19 UTC | Doc Text | An infinite-loop issue was found in the QEMU emulator built with USB EHCI emulation support. The flaw occurred during communication between the host controller interface(EHCI) and a respective device driver. These two communicate using an split isochronous transfer descriptor list(siTD); an infinite loop unfolded if there was a closed loop in the list. A privileged user inside a guest could use this flaw to consume excessive resources and cause denial of service. | |
| Whiteboard | impact=low,public=no,reported=20160408,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-835,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=affected,fedora-all/xen=affected | impact=low,public=20160418,reported=20160408,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-835,rhel-5/kvm=notaffected,rhel-5/xen=notaffected,rhel-6/qemu-kvm=wontfix,rhel-7/qemu-kvm=wontfix,rhel-7/qemu-kvm-rhev=wontfix,openstack-5/qemu-kvm-rhev=wontfix,openstack-6/qemu-kvm-rhev=wontfix,openstack-7/qemu-kvm-rhev=wontfix,openstack-8/qemu-kvm-rhev=wontfix,fedora-all/qemu=affected,fedora-all/xen=affected | ||
| Prasad Pandit | 2016-04-18 11:55:09 UTC | Summary | EMBARGOED qemu: Infinite loop vulnerability in usb_ehci using siTD process | qemu: Infinite loop vulnerability in usb_ehci using siTD process |
| Prasad Pandit | 2016-04-18 11:55:19 UTC | Group | security, qe_staff | |
| Prasad Pandit | 2016-04-18 11:55:33 UTC | Depends On | 1328080 | |
| Prasad Pandit | 2016-04-18 11:55:51 UTC | Depends On | 1328081 | |
| Prasad Pandit | 2016-04-18 11:56:55 UTC | Summary | qemu: Infinite loop vulnerability in usb_ehci using siTD process | Qemu: Infinite loop vulnerability in usb_ehci using siTD process |
| Prasad Pandit | 2016-04-18 11:58:12 UTC | Summary | Qemu: Infinite loop vulnerability in usb_ehci using siTD process | Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process |
| Prasad Pandit | 2016-04-18 18:22:02 UTC | Alias | CVE-2016-4037 | |
| Prasad Pandit | 2016-04-18 18:22:16 UTC | Summary | Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process | CVE-2016-4037 Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process |
| Perry Myers | 2016-04-19 01:00:48 UTC | CC | pmyers | |
| Salvatore Bonaccorso | 2016-04-23 17:12:10 UTC | CC | carnil | |
| Martin Prpič | 2016-05-05 13:32:05 UTC | Doc Text | An infinite-loop issue was found in the QEMU emulator built with USB EHCI emulation support. The flaw occurred during communication between the host controller interface(EHCI) and a respective device driver. These two communicate using an split isochronous transfer descriptor list(siTD); an infinite loop unfolded if there was a closed loop in the list. A privileged user inside a guest could use this flaw to consume excessive resources and cause denial of service. | |
| Eyal Edri | 2016-05-22 08:12:08 UTC | CC | eedri | |
| Scott Herold | 2017-09-12 15:29:10 UTC | CC | sherold | |
| PnT Account Manager | 2018-01-30 23:57:31 UTC | CC | aortega | |
| PnT Account Manager | 2018-07-18 14:51:56 UTC | CC | rbalakri | |
| PnT Account Manager | 2018-11-05 22:44:01 UTC | CC | ylavi | |
| Gil Klein | 2019-04-14 12:52:10 UTC | CC | gklein | |
| Product Security DevOps Team | 2019-06-08 02:50:27 UTC | Status | NEW | CLOSED |
| Resolution | --- | WONTFIX | ||
| Last Closed | 2019-06-08 02:50:27 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:46:44 UTC | Whiteboard | impact=low,public=20160418,reported=20160408,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-835,rhel-5/kvm=notaffected,rhel-5/xen=notaffected,rhel-6/qemu-kvm=wontfix,rhel-7/qemu-kvm=wontfix,rhel-7/qemu-kvm-rhev=wontfix,openstack-5/qemu-kvm-rhev=wontfix,openstack-6/qemu-kvm-rhev=wontfix,openstack-7/qemu-kvm-rhev=wontfix,openstack-8/qemu-kvm-rhev=wontfix,fedora-all/qemu=affected,fedora-all/xen=affected |
Back to bug 1325129