First published: Mon Aug 04 2014(Updated: )
It was found that vmstate_xhci_event field list was missing VMSTATE_END_OF_LIST() terminator and traversing through this list would result in out-of-bounds access during vm state saving and loading. Depending on how vmstate_xhci_event is placed in the qemu binary, this issue can range from non-issue, infinite loop to (potentially) privilege escalation in case the we end up with fields that have info and/or field_exist members initialized in a way that is useful for exploitation (most probably unlikely). In the worst case, attacker able to alter the migration data could use this flaw to to corrupt QEMU process memory. Upstream commit: <a href="http://git.qemu.org/?p=qemu.git;a=commit;h=3afca1d6d413592c2b78cf28f52fa24a586d8f56">http://git.qemu.org/?p=qemu.git;a=commit;h=3afca1d6d413592c2b78cf28f52fa24a586d8f56</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5263 has been classified with a medium severity due to potential out-of-bounds access.
To fix CVE-2014-5263, update QEMU to a version that includes the patch addressing the missing VMSTATE_END_OF_LIST() terminator.
CVE-2014-5263 specifically affects QEMU version 1.6.0.
The impact of CVE-2014-5263 includes possible crashes or unexpected behavior due to out-of-bounds memory access.
There are no reported workarounds for CVE-2014-5263; updating to a secure version is recommended.