SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   QEMU Vendors:   QEMU.org
QEMU AHCI NCQ AIO Command Processing Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1034859
SecurityTracker URL:  http://securitytracker.com/id/1034859
CVE Reference:   CVE-2016-1568   (Links to External Site)
Date:  Jan 28 2016
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in QEMU. A local user on the guest system can gain elevated privileges on the host system.

A local privileged user on the guest system can trigger a use-after-free memory error in the processing of certain AHCI Native Command Queuing (NCQ) AIO commands to cause the QEMU process to crash or potentially execute arbitrary code on the host system.

Systems built with the IDE AHCI Emulation support are affected.

Impact:   A local privileged user on the guest system can gain elevated privileges on the host system.
Solution:   The vendor has issued a source code fix, available at:

https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg01184.html

Vendor URL:  wiki.qemu.org/Main_Page (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jan 29 2016 (Red Hat Issues Fix for Red Hat Enterprise Virtualization) QEMU AHCI NCQ AIO Command Processing Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
Red Hat has issued a fix for Red Hat Enterprise Virtualization for Red Hat Enterprise Linux.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC