7.5
CWE
20
Advisory Published
CVE Published
Updated

CVE-2014-7840: Input Validation

First published: Wed Nov 12 2014(Updated: )

During migration, the values read from migration stream during ram load are not validated. Especially offset in host_from_stream_offset() and also the length of the writes in the callers of the said function. A user able to alter the savevm data (either on the disk or over the wire during migration) could use either of these flaws to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. Acknowledgements: This issue was discovered by Michael S. Tsirkin of Red Hat.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
QEMU<=2.1.3
Red Hat Enterprise Linux Desktop=7.0
Red Hat Enterprise Linux Server EUS=7.3
Red Hat Enterprise Linux Server EUS=7.4
Red Hat Enterprise Linux Server EUS=7.5
Red Hat Enterprise Linux Server EUS=7.6
Red Hat Enterprise Linux Server EUS=7.7
Red Hat Enterprise Linux Server=7.0
Red Hat Enterprise Linux Server=7.3
Red Hat Enterprise Linux Server=7.4
Red Hat Enterprise Linux Server=7.6
Red Hat Enterprise Linux Server=7.7
Red Hat Enterprise Linux Workstation=7.0
Red Hat Enterprise Virtualization=3.0
Red Hat Enterprise Linux=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2014-7840?

    CVE-2014-7840 is considered a moderate vulnerability that could lead to unauthorized memory access during the migration process.

  • How do I fix CVE-2014-7840?

    To fix CVE-2014-7840, update your QEMU to a version higher than 2.1.3 or apply the relevant patches provided by your Linux distribution.

  • What attack scenarios are possible with CVE-2014-7840?

    CVE-2014-7840 could allow an attacker to manipulate migration data, resulting in potential information disclosure or system compromise.

  • Which software is affected by CVE-2014-7840?

    CVE-2014-7840 affects QEMU versions up to 2.1.3 and various builds of Red Hat Enterprise Linux, including specific versions of Enterprise Linux Desktop and Server.

  • Is CVE-2014-7840 exploitable over the network?

    Yes, CVE-2014-7840 can be exploited over the network if the migration stream is not properly validated during the data transfer.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203