Out-of-bounds memory access vulnerability in in pit_ioport_read function in qemu-kvm
|ID: oval:org.secpod.oval:def:25178||Date: (C)2015-06-23 (M)2018-05-14|
|Class: VULNERABILITY||Family: unix|
The host is installed with qemu-kvm on Red Hat Enterprise Linux 7 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.
|Red Hat Enterprise Linux 7|