First published: Tue Jun 09 2015(Updated: )
Due converting PIO to the new memory read/write api we no longer provide separate I/O region lenghts for read and write operations. As a result, reading from PIT Mode/Command register will end with accessing pit->channels with invalid index and potentially cause memory corruption and/or minor information leak. A privileged guest user in a guest with QEMU PIT emulation enabled could potentially (tough unlikely) use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. (QEMU part of the vulnerability) A privileged guest user in a guest could potentially (tough unlikely) use this flaw to execute arbitrary code on the host. (KVM part of the vulnerability) Acknowledgements: Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.3.0 | |
Linux Linux kernel | <=2.6.32 | |
Arista EOS | =4.12 | |
Arista EOS | =4.13 | |
Arista EOS | =4.14 | |
Arista EOS | =4.15 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Lenovo Emc Px12-400r Ivx | <1.0.10.33264 | |
Lenovo Emc Px12-450r Ivx | <1.0.10.33264 | |
Redhat Openstack | =5.0 | |
Redhat Openstack | =6.0 | |
Redhat Virtualization | =3.0 | |
Redhat Enterprise Linux Compute Node Eus | =7.1 | |
Redhat Enterprise Linux Compute Node Eus | =7.2 | |
Redhat Enterprise Linux Compute Node Eus | =7.3 | |
Redhat Enterprise Linux Compute Node Eus | =7.4 | |
Redhat Enterprise Linux Compute Node Eus | =7.5 | |
Redhat Enterprise Linux Compute Node Eus | =7.6 | |
Redhat Enterprise Linux Compute Node Eus | =7.7 | |
Redhat Enterprise Linux For Power Big Endian | =7.0 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.1_ppc64 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.2_ppc64 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.3_ppc64 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.4_ppc64 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.5_ppc64 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.6_ppc64 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.7_ppc64 | |
Redhat Enterprise Linux For Scientific Computing | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Eus | =7.1 | |
Redhat Enterprise Linux Server Eus | =7.2 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.7 | |
Redhat Enterprise Linux Server From Rhui | =7.0 | |
Redhat Enterprise Linux Server Tus | =7.3 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.2 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.3 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.6 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.7 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.