<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2020-11869 qemu: integer overflow in ati_2d_blt() in hw/display/ati-2d.c could lead to DoS
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Mauro Matteo Cascella <mcascell () redhat com>
Date: Fri, 24 Apr 2020 16:43:45 +0200
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Hello all,
An integer overflow flaw was found in QEMU in the way it implemented the
ATI VGA
emulation. This flaw occurs in the ati_2d_blt() routine while handling MMIO
write
operations through ati_mm_write() callback. A malicious guest could abuse
this
flaw to crash the QEMU process, resulting in a denial of service.
Upstream patch:
->
https://git.qemu.org/?p=qemu.git;a=commit;h=ac2071c3791b67fc7af78b8ceb320c01ca1b5df7
This issue was reported by Ziming Zhang.
CVE-2020-11869 requested via -> https://cveform.mitre.org/
Thank you,
--
Mauro Matteo Cascella
Product Security Engineer
Red Hat <https://www.redhat.com/>
<https://www.redhat.com/>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2020-11869 qemu: integer overflow in ati_2d_blt() in hw/display/ati-2d.c could lead to DoS Mauro Matteo Cascella (Apr 24)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->