Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 557025 - (CVE-2010-0297) CVE-2010-0297 kvm-userspace-rhel5: usb-linux.c: fix buffer overflow
CVE-2010-0297 kvm-userspace-rhel5: usb-linux.c: fix buffer overflow
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,source=redhat,reporte...
: Security
Depends On: 560769 560770 560771
Blocks:
  Show dependency treegraph
 
Reported: 2010-01-20 01:59 EST by Eugene Teo (Security Response)
Modified: 2013-03-26 11:12 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-03-26 11:12:12 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0088 normal SHIPPED_LIVE Important: kvm security and bug fix update 2010-02-09 05:01:51 EST
Red Hat Product Errata RHSA-2010:0172 normal SHIPPED_LIVE Important: rhev-hypervisor security and bug fix update 2010-03-24 11:46:46 EDT

  None (edit)
Description Eugene Teo (Security Response) 2010-01-20 01:59:19 EST
Description of problem:
usb-linux.c: fix buffer overflow - made into 0.11.1. This bug is to ensure we backport this change to 0.10.0.
Comment 5 Josh Bressers 2010-01-20 13:40:11 EST
The patch for this seems to be here:
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=babd03fde68093482528010a5435c14ce9128e3f
Comment 6 Josh Bressers 2010-01-20 14:08:31 EST
So if I understand this correctly.

To exploit this flaw, an attacker would need:
1) A physical USB device plugged into the host machine
2) The USB device "attached" to a guest or the attacker has access to
    libvirtd and can attach a USB device.
3) Enough access to the guest to trigger the buffer overflow (root)

From what I can tell, without spending too much time on this, it's very
likely exploitable. I don't think we can prove it's not, as this will end
up overwriting a bunch of global structures, which would have a rather
unknown result.

Presuming my above alalysis is correct, this flaw is probably moderate.
Comment 10 errata-xmlrpc 2010-02-09 05:02:01 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0088 https://rhn.redhat.com/errata/RHSA-2010-0088.html
Comment 11 errata-xmlrpc 2010-03-24 11:47:00 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Virtualization for RHEL-5

Via RHSA-2010:0172 https://rhn.redhat.com/errata/RHSA-2010-0172.html

Note You need to log in before you can comment on or make changes to this bug.