A buffer overflow flaw was found in the way qemu processed SCSI REPORT LUNS command when excessive LUNS were defined for a single SCSI target. A privileged guest user could use this flaw to corrupt qemu process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the qemu process. Acknowledgements: This issue was discovered by Asias He of Red Hat.
Statement: This issue does not affect the kvm and xen packages as shipped with Red Hat Enterprise Linux 5. This issue does affect the qemu-kvm package as shipped with Red Hat Enterprise Linux 6. Future qemu-kvm updates in Red Hat Enterprise Linux 6 may address this flaw.
This is now public: http://www.openwall.com/lists/oss-security/2013/10/02/2
Created xen tracking bugs for this issue: Affects: fedora-all [bug 1015275]
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1015274]
qemu-1.4.2-12.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
qemu-1.6.0-10.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1553 https://rhn.redhat.com/errata/RHSA-2013-1553.html
This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2013:1527 https://rhn.redhat.com/errata/RHSA-2013-1527.html
This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2013:1754 https://rhn.redhat.com/errata/RHSA-2013-1754.html