Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <nycvar.YSQ.7.77.849.2007021123400.6260@xnncv>
Date: Thu, 2 Jul 2020 11:28:46 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: Lei Sun <slei.casper@...il.com>
Subject: CVE-2020-15469 QEMU: MMIO ops null pointer dereference may lead to
 DoS

   Hello,

A NULL pointer dereference issue was found in various system emulators of 
QEMU. It could occur while performing MMIO r/w operations, in case the 
respective handler function is not defined. A privileged guest user able to 
invoke MMIO operation may use this flaw to crash the QEMU process on the host 
resulting in DoS scenario.

Upstream patch(es):
-------------------
   -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html

This issue was reported by Lei Sun(CC'd); CVE-2020-15469 assigned via
-> https://cveform.mitre.org/.

Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.