Bug 923219 (CVE-2013-1922)

Summary: CVE-2013-1922 qemu, qemu-kvm, kvm: qemu-nbd block format auto-detection vulnerability
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abaron, acathrow, aortega, apevec, areis, ayoung, berrange, bsarathy, carnil, chrisw, cpelland, dallan, ehabkost, gleb, hdegoede, juzhang, knoel, markmc, minovotn, mkenneth, mtosatti, ndipanov, pbonzini, pmatouse, rbryant, rhod, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-08-09 04:12:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 952574, 952576    
Bug Blocks: 923224    
Attachments:
Description Flags
Proposed patch from Daniel Berrange to correct this problem none

Description Jan Lieskovsky 2013-03-19 13:04:27 UTC
A security flaw was found in the way qemu-nbd, the QEMU Disk Network Block Device server tool of QEMU, performed detection of image formats (the image format has been previously autodetected). A guest operating system administrator could write a header to particular raw disk image format, describing another format than original one for that disk image, leading to scenario in which after restart of that guest, QEMU would detect new format of the image, and could allow the guest to read any file on the host if QEMU was sufficiently privileged.

A different vulnerability that CVE-2008-2004.

Comment 1 Jan Lieskovsky 2013-03-19 13:12:31 UTC
Acknowledgements:

This issue was found by Daniel Berrange of Red Hat.

Comment 3 Jan Lieskovsky 2013-03-19 13:16:28 UTC
Created attachment 712650 [details]
Proposed patch from Daniel Berrange to correct this problem

Comment 5 Jan Lieskovsky 2013-03-19 13:19:48 UTC
Preliminary (might be subject of change yet) embargo date for this issue has been set up to Monday, 15-th of April 2013.

Comment 10 Petr Matousek 2013-04-09 15:26:12 UTC
Statement:

Not vulnerable.

This issue does not affect versions of kvm and xen packages as shipped with Red Hat Enterprise Linux 5. This issue does not affect versions of qemu-kvm packages as shipped with Red Hat Enterprise Linux 5 and 6.

Comment 11 Petr Matousek 2013-04-16 08:53:51 UTC
Created xen tracking bugs for this issue

Affects: fedora-all [bug 952576]

Comment 12 Petr Matousek 2013-04-16 08:53:57 UTC
Created qemu tracking bugs for this issue

Affects: fedora-all [bug 952574]

Comment 13 Fedora Update System 2013-04-25 14:17:54 UTC
qemu-1.4.1-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 Fedora Update System 2013-04-26 00:54:29 UTC
qemu-1.2.2-11.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 15 Fedora Update System 2013-04-30 03:34:46 UTC
qemu-1.0.1-6.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.