On 210225 1931, P J P wrote: > +-- On Wed, 24 Feb 2021, Philippe Mathieu-Daudé wrote --+ > | On 2/24/21 2:17 PM, Jason Wang wrote: > | > On 2021/2/24 6:11 下午, Philippe Mathieu-Daudé wrote: > | >> IIUC the guest could trigger an infinite loop and brick the emulated > | >> device model. Likely exhausting the stack, so either SEGV by corruption > | >> or some ENOMEM? > | > > | > Yes. > | >> > | >> Since this is guest triggerable, shouldn't we contact qemu-security@ > list > | >> and ask for a CVE for this issue, so distributions can track the patches > | >> to backport in their stable releases? (it seems to be within the KVM > | >> devices boundary). > | > > | > > | > That's the plan. I discussed this with Prasad before and he promise to > | > ask CVE for this. > > 'CVE-2021-3416' is assigned to this issue by Red Hat Inc. >
Hi Prasad, What is the difference with CVE-2021-20255 and CVE-2021-20257 ? Aren't those just manifestations of this bug for the e1000 and the eepro100 bug? -Alex > Thank you. > -- > Prasad J Pandit / Red Hat Product Security Team > 8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D