Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALJHwhSVO9HQDkChaAy0ULqfHgMCODtaaLX9sPgz6OyFueUm9A@mail.gmail.com>
Date: Mon, 18 Feb 2019 13:21:59 +1000
From: Wade Mealing <wmealing@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2019-3812 - qemu - Out-of-bounds read in hw/i2c/i2c-ddc.c allows
 for memory disclosure

QEMU through version 2.10 through to 3.1.0 is vulnerable to an
out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c in the
function i2c_ddc() function. A local attacker with permission to
execute i2c commands could exploit this to read stack memory of the
qemu process on the host.

This was fixed upstream in commit 5b267840515730dbf6753495d5b7bd8b04ad1c

Systems without a monitor connected are affected, as are virtual
monitor is presented to virtual guests.  Systems with no graphics
cards attached to the virtual host are not affected.

This seems to be an information leak of stack contents which can be
used to defeat some kernel level protections and simplify further
attacks.

Red Hat Bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=1665792

Github patch on qemu:
https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c

Thanks,


-- 
Wade Mealing

Product Security - Kernel, RHCE

Red Hat

wmealing@...hat.com

TRIED. TESTED. TRUSTED.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.