Bug 568809 - (CVE-2010-0431) CVE-2010-0431 qemu: Insufficient guest provided pointers validation
CVE-2010-0431 qemu: Insufficient guest provided pointers validation
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
public=20100819,reported=20100223,sou...
: Security
Depends On: 568816 568817 568818 568819 568820
Blocks:
  Show dependency treegraph
 
Reported: 2010-02-26 11:56 EST by Petr Matousek
Modified: 2016-04-26 15:50 EDT (History)
9 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-05-08 16:06:01 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2010-02-26 11:56:56 EST
Izik Eidus found a bug in QEMU that allows priviledged guest user
to touch arbitrary memory in the hosting QEMU process. The bug is in
QXL code. Guest and host share region of memory and
use it to communicate with each other. Malicious user can use the
lack of validation of pointers embedded into data structures in
this memory area to touch host's abitrary memory location and/or make
the hosting QEMU process crash by dereferencing invalid pointer.
Comment 9 errata-xmlrpc 2010-08-19 17:31:49 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0627 https://rhn.redhat.com/errata/RHSA-2010-0627.html
Comment 10 errata-xmlrpc 2010-08-19 17:45:34 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Virtualization for RHEL-5

Via RHSA-2010:0622 https://rhn.redhat.com/errata/RHSA-2010-0622.html

Note You need to log in before you can comment on or make changes to this bug.