6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
qemu-kvm-rhev is vulnerable to arbitrary code execution attacks. The vulnerability exists as the pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
rhn.redhat.com/errata/RHSA-2015-1507.html
rhn.redhat.com/errata/RHSA-2015-1508.html
rhn.redhat.com/errata/RHSA-2015-1512.html
www.debian.org/security/2015/dsa-3348
www.openwall.com/lists/oss-security/2015/06/25/7
www.securityfocus.com/bid/75273
www.securitytracker.com/id/1032598
access.redhat.com/errata/RHSA-2015:1507
access.redhat.com/errata/RHSA-2015:1508
access.redhat.com/errata/RHSA-2015:1512
access.redhat.com/security/cve/CVE-2015-3214
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1229640
github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
rhn.redhat.com/errata/RHSA-2015-1512.html
security.gentoo.org/glsa/201510-02
support.lenovo.com/product_security/qemu
support.lenovo.com/us/en/product_security/qemu
www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
www.exploit-db.com/exploits/37990/
www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.html
www.mail-archive.com/[email protected]/msg304138.html