|
Message-ID: <CAA8xKjXoHR_u8n2T+4Yj545m_VZ3CKqPLRwPXhCC3fCQsbXXLQ@mail.gmail.com> Date: Wed, 22 Jul 2020 12:51:56 +0200 From: Mauro Matteo Cascella <mcascell@...hat.com> To: oss-security@...ts.openwall.com, ziming zhang <ezrakiez@...il.com> Subject: CVE-2020-15863 QEMU: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c Hello, a stack-based buffer overflow vulnerability was found in the XGMAC NIC device of the QEMU emulator. This flaw occurs during packet transmission and affects the highbank and midway ARM emulated machines. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process. Upstream patch: ---------------------- -> https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555 This issue was reported by Ziming Zhang (CC'd). CVE-2020-15863 requested via MITRE form: https://cveform.mitre.org/ Regards, -- Mauro Matteo Cascella, Red Hat Product Security 6F78 E20B 5935 928C F0A8 1A9D 4E55 23B8 BB34 10B0
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.