First published: Fri Jan 11 2019(Updated: )
An out of bounds r/w access issue was found in the way QEMU handled inquiry request coming from a guest in scsi_handle_inquiry_reply(). A guest user/process could use this flaw to corrupt byte of QEMU process memory. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html">https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2019/01/24/1">https://www.openwall.com/lists/oss-security/2019/01/24/1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm-ma | <10:2.12.0-33.el7 | 10:2.12.0-33.el7 |
redhat/qemu-kvm-rhev | <10:2.12.0-33.el7 | 10:2.12.0-33.el7 |
QEMU | =3.1 | |
Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-6501 is classified as a high severity vulnerability due to the potential for memory corruption in the QEMU process.
To fix CVE-2019-6501, upgrade to the patched version 10:2.12.0-33.el7 for the affected QEMU packages.
CVE-2019-6501 affects several versions of QEMU, including QEMU KVM and specific Fedora releases.
CVE-2019-6501 is a memory corruption vulnerability caused by out-of-bounds read and write access.
Yes, exploiting CVE-2019-6501 may allow an attacker to execute arbitrary code on the QEMU host.