Lucene search

K
freebsdFreeBSDAEA8D90E-B0C1-11E5-8D13-BC5FF45D0F28
HistoryJun 17, 2015 - 12:00 a.m.

qemu -- code execution on host machine

2015-06-1700:00:00
vuxml.freebsd.org
14

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

37.5%

Petr Matousek of Red Hat Inc. reports:

Due converting PIO to the new memory read/write api we no longer
provide separate I/O region lenghts for read and write operations.
As a result, reading from PIT Mode/Command register will end with
accessing pit->channels with invalid index and potentially cause
memory corruption and/or minor information leak.
A privileged guest user in a guest with QEMU PIT emulation enabled
could potentially (tough unlikely) use this flaw to execute
arbitrary code on the host with the privileges of the hosting QEMU
process.
Please note that by default QEMU/KVM guests use in-kernel (KVM) PIT
emulation and are thus not vulnerable to this issue.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchqemu< 2.4.0UNKNOWN
FreeBSDanynoarchqemu-devel< 2.4.0UNKNOWN
FreeBSDanynoarchqemu-sbruno< 2.4.50.g20150814UNKNOWN
FreeBSDanynoarchqemu-user-static< 2.4.50.g20150814UNKNOWN

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

37.5%