oss-sec mailing list archives
CVE-2015-3214 qemu: i8254: out-of-bounds memory access in pit_ioport_read function
From: Petr Matousek <pmatouse () redhat com>
Date: Wed, 17 Jun 2015 13:09:30 +0200
Due converting PIO to the new memory read/write api we no longer provide separate I/O region lenghts for read and write operations. As a result, reading from PIT Mode/Command register will end with accessing pit->channels with invalid index and potentially cause memory corruption and/or minor information leak. A privileged guest user in a guest with QEMU PIT emulation enabled could potentially (tough unlikely) use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. Please note that by default QEMU/KVM guests use in-kernel (KVM) PIT emulation and are thus not vulnerable to this issue. Acknowledgements: Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue. Upstream patch submission: https://www.mail-archive.com/qemu-devel () nongnu org/msg304063.html -- Petr Matousek / Red Hat Product Security PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3 D874 3E78 6F42 C449 77CA
Current thread:
- CVE-2015-3214 qemu: i8254: out-of-bounds memory access in pit_ioport_read function Petr Matousek (Jun 17)