|
Message-ID: <CALJHwhSVO9HQDkChaAy0ULqfHgMCODtaaLX9sPgz6OyFueUm9A@mail.gmail.com> Date: Mon, 18 Feb 2019 13:21:59 +1000 From: Wade Mealing <wmealing@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE-2019-3812 - qemu - Out-of-bounds read in hw/i2c/i2c-ddc.c allows for memory disclosure QEMU through version 2.10 through to 3.1.0 is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c in the function i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host. This was fixed upstream in commit 5b267840515730dbf6753495d5b7bd8b04ad1c Systems without a monitor connected are affected, as are virtual monitor is presented to virtual guests. Systems with no graphics cards attached to the virtual host are not affected. This seems to be an information leak of stack contents which can be used to defeat some kernel level protections and simplify further attacks. Red Hat Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1665792 Github patch on qemu: https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c Thanks, -- Wade Mealing Product Security - Kernel, RHCE Red Hat wmealing@...hat.com TRIED. TESTED. TRUSTED.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.