Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAA8xKjXoHR_u8n2T+4Yj545m_VZ3CKqPLRwPXhCC3fCQsbXXLQ@mail.gmail.com>
Date: Wed, 22 Jul 2020 12:51:56 +0200
From: Mauro Matteo Cascella <mcascell@...hat.com>
To: oss-security@...ts.openwall.com, ziming zhang <ezrakiez@...il.com>
Subject: CVE-2020-15863 QEMU: stack-based overflow in
 xgmac_enet_send() in hw/net/xgmac.c

Hello,

a stack-based buffer overflow vulnerability was found in the XGMAC NIC
device of the QEMU emulator. This flaw occurs during packet
transmission and affects the highbank and midway ARM emulated
machines. A malicious guest could use this flaw to crash the QEMU
process on the host, resulting in a denial of service or potential
code execution with the privileges of the QEMU process.

Upstream patch:
----------------------
  -> https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555

This issue was reported by Ziming Zhang (CC'd).
CVE-2020-15863 requested via MITRE form: https://cveform.mitre.org/

Regards,
-- 
Mauro Matteo Cascella, Red Hat Product Security
6F78 E20B 5935 928C F0A8  1A9D 4E55 23B8 BB34 10B0

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.