Hello Prasad,

The patch is good.
Jason, would you apply is from attachment or should it be resent by "git 
send-email”?

Acked-by: Dmitry Fleytman <dmi...@daynix.com <mailto:dmi...@daynix.com>>

~Dmitry

> On 2 Dec 2015, at 14:17 PM, P J P <ppan...@redhat.com> wrote:
> 
>  Hello Dmitry, all
> 
> A memory leakage issue was reported by Mr Qinghao Tang, CC'd here.
> 
> In that, the Qemu VMXNET3 paravirtual device emulator does not check if the 
> device is already active, before activating it. This leads to host memory 
> leakage via calls to vmxnet_tx_pkt_init(), which calls g_malloc0().
> 
> ===
> static void vmxnet3_activate_device(VMXNET3State *s)
> {
>   ...
>   /* Preallocate TX packet wrapper */
>   VMW_CFPRN("Max TX fragments is %u", s->max_tx_frags);
>   vmxnet_tx_pkt_init(&s->tx_pkt, s->max_tx_frags, s->peer_has_vhdr);
>   ...
> }
> ===
> 
> A malicious guest driver could use this flaw to leak excessive memory on the 
> host, eventually killing the Qemu process.
> 
> Please see attached herein is a proposed (tested)patch which fixes this 
> issue. Please let me know if it's okay or requires any changes.
> 
> Thank you.
> --
> Prasad J Pandit / Red Hat Product Security Team
> 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 
> 041F<0001-net-vmxnet3-avoid-multiple-activations-of-device.patch>

Reply via email to