Bug 1097222 (CVE-2014-0223)
Summary: | CVE-2014-0223 Qemu: qcow1: validate image size to avoid out-of-bounds memory access | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Prasad Pandit <ppandit> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abaron, amit.shah, aortega, apevec, areis, ayoung, berrange, bsarathy, cfergeau, chrisw, dallan, dwmw2, ehabkost, gkotton, gmollett, itamar, jkurik, jrusnack, juzhang, knoel, kwolf, lhh, lpeer, markmc, mkenneth, mrezanin, mtosatti, pbonzini, rbalakri, rbryant, rhod, rjones, sclewis, scottt.tw, stefanha, virt-maint, virt-maint, vkrizan, yeylon |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-09-22 04:49:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1097234, 1097235, 1097236, 1097237, 1097238, 1133427, 1133428, 1133429 | ||
Bug Blocks: | 1094952, 1133827 |
Description
Prasad Pandit
2014-05-13 12:09:09 UTC
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1097238] qemu-1.6.2-6.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. IssueDescription: An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0927 https://rhn.redhat.com/errata/RHSA-2014-0927.html Acknowledgements: Red Hat would like to thank NSA for reporting this issue. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1075 https://rhn.redhat.com/errata/RHSA-2014-1075.html This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2014:1076 https://rhn.redhat.com/errata/RHSA-2014-1076.html This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2014:1168 https://rhn.redhat.com/errata/RHSA-2014-1168.html This issue has been addressed in the following products: OpenStack 4 for RHEL 6 OpenStack 5 for RHEL 6 Via RHSA-2014:1187 https://rhn.redhat.com/errata/RHSA-2014-1187.html This issue has been addressed in the following products: OpenStack 5 for RHEL 7 Via RHSA-2014:1268 https://rhn.redhat.com/errata/RHSA-2014-1268.html |