4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
QEMU is vulnerable to arbitray code execution. A local guest user is able to write arbitrary data outside of VRAM-allocated buffer boundaries in the host’s application address space due to insufficient checks in the Cirrus blit
region, leading to execution of arbitrary code.
git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bf25983345ca44aec3dd92c57142be45452bd38a
git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d3532a0db02296e687711b8cdc7791924efccea0
git.qemu.org/?p=qemu.git;a=commit;h=bf25983345ca44aec3dd92c57142be45452bd38a
git.qemu.org/?p=qemu.git;a=commit;h=d3532a0db02296e687711b8cdc7791924efccea0
lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
lists.gnu.org/archive/html/qemu-devel/2014-12/msg00508.html
rhn.redhat.com/errata/RHSA-2015-0349.html
rhn.redhat.com/errata/RHSA-2015-0624.html
rhn.redhat.com/errata/RHSA-2015-0643.html
rhn.redhat.com/errata/RHSA-2015-0795.html
rhn.redhat.com/errata/RHSA-2015-0867.html
rhn.redhat.com/errata/RHSA-2015-0868.html
rhn.redhat.com/errata/RHSA-2015-0891.html
secunia.com/advisories/60364
support.citrix.com/article/CTX200892
www.debian.org/security/2014/dsa-3087
www.debian.org/security/2014/dsa-3088
www.openwall.com/lists/oss-security/2014/12/04/8
www.securityfocus.com/bid/71477
access.redhat.com/errata/RHSA-2015:0349
access.redhat.com/errata/RHSA-2015:0624
access.redhat.com/errata/RHSA-2015:0643
access.redhat.com/errata/RHSA-2015:0795
access.redhat.com/errata/RHSA-2015:0867
access.redhat.com/errata/RHSA-2015:0868
access.redhat.com/errata/RHSA-2015:0891
access.redhat.com/security/cve/CVE-2014-8106
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1169454
exchange.xforce.ibmcloud.com/vulnerabilities/99126
rhn.redhat.com/errata/RHSA-2015-0643.html