First published: Mon Dec 01 2014(Updated: )
Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm-rhev | <2:0.12.1.2-2.448.el6_6.2 | 2:0.12.1.2-2.448.el6_6.2 |
redhat/qemu-kvm | <2:0.12.1.2-2.448.el6_6.2 | 2:0.12.1.2-2.448.el6_6.2 |
redhat/qemu-kvm | <10:1.5.3-86.el7 | 10:1.5.3-86.el7 |
redhat/qemu-kvm-rhev | <10:2.1.2-23.el7 | 10:2.1.2-23.el7 |
QEMU KVM | <=2.1.2 | |
QEMU KVM | =2.1.0 | |
QEMU KVM | =2.1.0-rc0 | |
QEMU KVM | =2.1.0-rc1 | |
QEMU KVM | =2.1.0-rc2 | |
QEMU KVM | =2.1.0-rc3 | |
QEMU KVM | =2.1.0-rc5 | |
QEMU KVM | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2014-8106 is classified as a high severity vulnerability due to its potential for local users to execute arbitrary code.
To fix CVE-2014-8106, upgrade to QEMU version 2.2.0 or later.
CVE-2014-8106 affects QEMU versions prior to 2.2.0, including the versions specifically listed in the security advisory.
Yes, local guest users can exploit CVE-2014-8106 to execute arbitrary code via corrupted blit regions.
There is no effective workaround for CVE-2014-8106; the best solution is to apply the software update.