Back to bug 1303226

Who When What Removed Added
Adam Mariš 2016-01-29 21:27:27 UTC CC security-response-team
Red Hat Bugzilla 2016-01-29 21:27:27 UTC Doc Type --- Bug Fix
Adam Mariš 2016-01-29 21:37:15 UTC Blocks 1303107
Prasad Pandit 2016-02-09 17:11:07 UTC Blocks 1305966
Prasad Pandit 2016-02-09 17:11:38 UTC Blocks 1303107
Prasad Pandit 2016-02-10 05:30:11 UTC Priority medium low
CC prasad
Doc Text Qemu emulator built with the IDE Emulation with PCI PIIX3/4 support is vulnerable to a use after free flaw. It occurs while unplugging the IDE device in pci_piix3_xen_ide_unplug
in Xen virtualisation setup. A privileged user inside guest could use this issue to crash the Qemu process resulting in DoS.
Whiteboard impact=moderate,public=no,reported=20160129,source=researcher,cvss2=5.2/AV:A/AC:M/Au:S/C:N/I:N/A:C,cwe=CWE-416,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=affected,fedora-all/xen=affected impact=low,public=20150803,reported=20160129,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-416,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=new,fedora-all/xen=new
Severity medium low
Prasad Pandit 2016-02-10 05:38:48 UTC Summary EMBARGOED qemu: Use-after-free vulnerability when unplugging devices qemu: Use-after-free vulnerability when unplugging devices
Prasad Pandit 2016-02-10 05:39:27 UTC Group security, qe_staff
Prasad Pandit 2016-02-11 06:20:18 UTC Status NEW CLOSED
Resolution --- NOTABUG
Last Closed 2016-02-11 01:20:18 UTC
Martin Prpič 2016-03-15 11:33:19 UTC Doc Text Qemu emulator built with the IDE Emulation with PCI PIIX3/4 support is vulnerable to a use after free flaw. It occurs while unplugging the IDE device in pci_piix3_xen_ide_unplug
in Xen virtualisation setup. A privileged user inside guest could use this issue to crash the Qemu process resulting in DoS.
Perry Myers 2016-04-26 13:27:54 UTC CC pmyers
Product Security DevOps Team 2019-09-29 13:43:28 UTC Whiteboard impact=low,public=20150803,reported=20160129,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-416,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=new,fedora-all/xen=new

Back to bug 1303226