{"id":"CVE-2014-7840","details":"The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.","modified":"2026-04-16T01:44:02.114005419Z","published":"2014-12-12T15:59:08Z","withdrawn":"2026-01-27T04:13:21.277348Z","related":["SUSE-SU-2015:0349-1","SUSE-SU-2015:0357-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-0349.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-0624.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1163075"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/99194"},{"type":"WEB","url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08"},{"type":"WEB","url":"http://thread.gmane.org/gmane.comp.emulators.qemu/306117"}],"schema_version":"1.7.3"}