Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html | third party advisory mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html | third party advisory mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html | third party advisory mailing list |
https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html | patch mailing list third party advisory |
http://www.openwall.com/lists/oss-security/2015/08/06/3 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2015/08/06/5 | mailing list third party advisory exploit |
https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295 | third party advisory patch |
https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13 | third party advisory |