Описание
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-7840
- https://access.redhat.com/errata/RHSA-2015:0349
- https://access.redhat.com/errata/RHSA-2015:0624
- https://access.redhat.com/security/cve/CVE-2014-7840
- https://bugzilla.redhat.com/show_bug.cgi?id=1163075
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99194
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08
- http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08
- http://rhn.redhat.com/errata/RHSA-2015-0349.html
- http://rhn.redhat.com/errata/RHSA-2015-0624.html
- http://thread.gmane.org/gmane.comp.emulators.qemu/306117
Связанные уязвимости
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
The host_from_stream_offset function in arch_init.c in QEMU, when load ...