oss-sec mailing list archives

CVE request Qemu: out of bounds memory access


From: P J P <ppandit () redhat com>
Date: Fri, 22 Aug 2014 18:16:49 +0530 (IST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

   Hello,

An out of bounds memory access flaw was found in Qemu's ACPI PCI hotplug interface. It leads to Qemu's memory corruption via OOB write(4 bytes) and information disclosure(~12 bytes) through OOB read.

A user with a custom PCI device could use this flaw to leak qemu process' memory bytes or corrupt them on the host.

Upstream fix:
- -------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2014-08/msg03338.html

Thank you.
- --
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=QT4+
-----END PGP SIGNATURE-----


Current thread: