Date: Thu, 8 Mar 2018 23:52:33 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> cc: Cyrille Chatras <cyrille.chatras@...nge.com> Subject: CVE-2018-7550 Qemu: i386: multiboot OOB access while loading kernel image Hello, Quick Emulator(QEMU) built with the PC System Emulator with multiboot feature support is vulnerable to an OOB r/w memory access issue. It could occur while loading a kernel image during a guest boot if multiboot head addresses mh_load_end_addr was greater than mh_bss_end_addr. A user/process could use this flaw to potentially achieve arbitrary code execution on a host. Upstream patch: --------------- -> https://lists.nongnu.org/archive/html/qemu-devel/2018-03/msg01885.html This issue was reported by Cyrille Chatras of Orange.com. CVE-2018-7550 assigned via -> https://cveform.mitre.org/ Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ