An out of bounds memory access flaw was found in Qemu's IDE device model. It leads to Qemu's memory corruption via buffer overwrite(4 bytes). It occurs while executing IDE SMART commands. A privileged guest user could use this flaw to corrupt qemu process' memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the qemu process. Upstream fix: ------------- -> https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html
Statement: This issue does not affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5.
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1087981]
Upstream commit: http://git.qemu.org/?p=qemu.git;a=commit;h=940973ae0b45c9b6817bab8e4cf4df99a9ef83d7
qemu-1.6.2-4.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2014:0674 https://rhn.redhat.com/errata/RHSA-2014-0674.html
This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0704 https://rhn.redhat.com/errata/RHSA-2014-0704.html
This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2014:0744 https://rhn.redhat.com/errata/RHSA-2014-0744.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0743 https://rhn.redhat.com/errata/RHSA-2014-0743.html
This issue has been addressed in following products: OpenStack 4 for RHEL 6 OpenStack 3 for RHEL 6 Via RHSA-2014:0888 https://rhn.redhat.com/errata/RHSA-2014-0888.html