Bug 713589 - (CVE-2011-2212) CVE-2011-2212 qemu-kvm: virtqueue: too-large indirect descriptor buffer overflow
CVE-2011-2212 qemu-kvm: virtqueue: too-large indirect descriptor buffer overflow
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 713592 713593 713594 713595 713597
  Show dependency treegraph
Reported: 2011-06-15 16:45 EDT by Petr Matousek
Modified: 2015-07-31 02:46 EDT (History)
20 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2012-05-31 03:46:08 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2011-06-15 16:45:48 EDT
It was found that virtio subsystem in qemu-kvm did not properly validate virtqueue in and out requests from the guest. A privileged guest user could use this flaw to cause buffer overflow, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host.


Red Hat would like to thank Nelson Elhage for reporting this issue.
Comment 11 Petr Matousek 2011-06-20 08:58:22 EDT

This issue only affects Red Hat Enterprise Linux 6. The version of the qemu/kvm
as shipped with Red Hat Enterprise Linux 5 is not affected because it does not provide support for indirect descriptors.
Comment 12 errata-xmlrpc 2011-07-05 14:08:00 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0919 https://rhn.redhat.com/errata/RHSA-2011-0919.html

Note You need to log in before you can comment on or make changes to this bug.