|
Message-ID: <alpine.LFD.2.10.1408221815010.7247@wniryva.cad.erqung.pbz> Date: Fri, 22 Aug 2014 18:16:49 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: CVE request Qemu: out of bounds memory access -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, An out of bounds memory access flaw was found in Qemu's ACPI PCI hotplug interface. It leads to Qemu's memory corruption via OOB write(4 bytes) and information disclosure(~12 bytes) through OOB read. A user with a custom PCI device could use this flaw to leak qemu process' memory bytes or corrupt them on the host. Upstream fix: - ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2014-08/msg03338.html Thank you. - -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJT9zu6AAoJEN0TPTL+WwQfujMQAJtMJk7v8gguLfbPEj3qPpfa Vw2x3SZIh+kO5bPSF7TqHI+O9mscWGpPxPqRz2HRlrNu7uMQgjiaLssXLmO5YjBy 2+TvLXKhDhpbr1X3IkmOkhAs+ZNJWatbHTxD4NulMEHTxrMrRkA8l0/swxTgA8m9 3d1pKx3uKHU0SQCL7oSZNTZM2VGVhwAWY4wP37gde8Gv+Tgi+wR8uxuBgXekq7IW DVf2Q91bUtw9kor9aYrJ49BzIOyoMuQ42FNz/85ha+DCWAIr4dzyrZ7uRmJrJuz9 T0xA/8J5APdZ9+lh7CPuKta/Ysu3ardZQRcl4rBxCwBhKfIxu3blgjhgyb8FKXfK pWegt/Ow0XQhWLmAd2mw6UW2JO2JxIVlCMJSLtDf08R62EwOB4R0w0SQwyd+c5Gi 3+nDKllig8bJ2Pap+GFmrjb6SDrjEz2Jviz22KYQWVXbyZaDpQVtS7EKpO9Svf5H hiTGJu3JxLJj6R5xF4GCbAIfSoCcCCm54BA9nkQLjgrlhUnxEPwbu9C2yQD9XYqL ROvebFPt+NKPDcjICs7xiHtnn9htYI4aWWfRaJlcappveCfo/a++/iBPSzV6LXsp yuxW2MLvdZxEkYQ01EHFyE+Ooe97z4tlVigXX8dvki1s3mBiV7CwRLBP/hRzQEnM PKeD580m8YSk8wXatKnf =QT4+ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.