A security flaw was found in the way qemu-nbd, the QEMU Disk Network Block Device server tool of QEMU, performed detection of image formats (the image format has been previously autodetected). A guest operating system administrator could write a header to particular raw disk image format, describing another format than original one for that disk image, leading to scenario in which after restart of that guest, QEMU would detect new format of the image, and could allow the guest to read any file on the host if QEMU was sufficiently privileged. A different vulnerability that CVE-2008-2004.
Acknowledgements: This issue was found by Daniel Berrange of Red Hat.
Created attachment 712650 [details] Proposed patch from Daniel Berrange to correct this problem
Preliminary (might be subject of change yet) embargo date for this issue has been set up to Monday, 15-th of April 2013.
Statement: Not vulnerable. This issue does not affect versions of kvm and xen packages as shipped with Red Hat Enterprise Linux 5. This issue does not affect versions of qemu-kvm packages as shipped with Red Hat Enterprise Linux 5 and 6.
Created xen tracking bugs for this issue Affects: fedora-all [bug 952576]
Created qemu tracking bugs for this issue Affects: fedora-all [bug 952574]
qemu-1.4.1-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
qemu-1.2.2-11.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
qemu-1.0.1-6.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.