The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-0624.html | third party advisory vendor advisory |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08 | |
http://thread.gmane.org/gmane.comp.emulators.qemu/306117 | mailing list broken link |
http://rhn.redhat.com/errata/RHSA-2015-0349.html | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99194 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1163075 | issue tracking third party advisory |