|
Message-Id: <20150806143203.5F2A06C00F1@smtpvmsrv1.mitre.org> Date: Thu, 6 Aug 2015 10:32:03 -0400 (EDT) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: Qemu: buffer overflow in virtio-serial -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295 > https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html > Don't assume a specific layout for control messages. > hw/char/virtio-serial-bus.c > send_control_msg > - memcpy(elem.in_sg[0].iov_base, buf, len); > + /* TODO: detect a buffer that's too short, set NEEDS_RESET */ > + iov_from_buf(elem.in_sg, elem.in_num, 0, buf, len); > Qemu emulator built with the virtio-serial vmchannel support is vulnerable to > a buffer overflow issue. It could occur while exchanging virtio control > messages between guest & the host. > > A malicious guest could use this flaw to corrupt few bytes of Qemu memory > area, potentially crashing the Qemu process. Use CVE-2015-5745. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJVw283AAoJEKllVAevmvmsfgwH/2QCbFLQJTRfcaExszbdczlX ciSqTWOuUev2zrch+wptzCNIzmuRo+16quDQ+sNcgefTFQwZQs14XYMp9n3xv2Tg w++oYByFgWJps1tev18UiHIRUA7YEvl7LDYL++BgHeL3McOIXowilj0+0p7kgx1b AI6Jx566eBecMcoRQtPH4X0zKg5Hrd7k97rHGqPhza1eKjkweSVfuHVliuFTkIH9 le8+84TxOWlTAZv4xgmDDkCpPINJmATPnc3zfHNjpRyHVFB2jVahLplSDOOdrE2w uqe59griVgciusqQnhStau5bZXh1gUzGN2yqz/XCkXua135o/vMN/NgnUxJ1GbA= =P2BP -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.