Back to bug 1303226
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-01-29 21:27:27 UTC | CC | security-response-team | |
| Red Hat Bugzilla | 2016-01-29 21:27:27 UTC | Doc Type | --- | Bug Fix |
| Adam Mariš | 2016-01-29 21:37:15 UTC | Blocks | 1303107 | |
| Prasad Pandit | 2016-02-09 17:11:07 UTC | Blocks | 1305966 | |
| Prasad Pandit | 2016-02-09 17:11:38 UTC | Blocks | 1303107 | |
| Prasad Pandit | 2016-02-10 05:30:11 UTC | Priority | medium | low |
| CC | prasad | |||
| Doc Text | Qemu emulator built with the IDE Emulation with PCI PIIX3/4 support is vulnerable to a use after free flaw. It occurs while unplugging the IDE device in pci_piix3_xen_ide_unplug in Xen virtualisation setup. A privileged user inside guest could use this issue to crash the Qemu process resulting in DoS. | |||
| Whiteboard | impact=moderate,public=no,reported=20160129,source=researcher,cvss2=5.2/AV:A/AC:M/Au:S/C:N/I:N/A:C,cwe=CWE-416,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=affected,fedora-all/xen=affected | impact=low,public=20150803,reported=20160129,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-416,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=new,fedora-all/xen=new | ||
| Severity | medium | low | ||
| Prasad Pandit | 2016-02-10 05:38:48 UTC | Summary | EMBARGOED qemu: Use-after-free vulnerability when unplugging devices | qemu: Use-after-free vulnerability when unplugging devices |
| Prasad Pandit | 2016-02-10 05:39:27 UTC | Group | security, qe_staff | |
| Prasad Pandit | 2016-02-11 06:20:18 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2016-02-11 01:20:18 UTC | |||
| Martin Prpič | 2016-03-15 11:33:19 UTC | Doc Text | Qemu emulator built with the IDE Emulation with PCI PIIX3/4 support is vulnerable to a use after free flaw. It occurs while unplugging the IDE device in pci_piix3_xen_ide_unplug in Xen virtualisation setup. A privileged user inside guest could use this issue to crash the Qemu process resulting in DoS. | |
| Perry Myers | 2016-04-26 13:27:54 UTC | CC | pmyers | |
| Product Security DevOps Team | 2019-09-29 13:43:28 UTC | Whiteboard | impact=low,public=20150803,reported=20160129,source=researcher,cvss2=2.3/AV:A/AC:M/Au:S/C:N/I:N/A:P,cwe=CWE-416,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=new,fedora-all/xen=new |
Back to bug 1303226