Bug 957155 (CVE-2013-2016) - CVE-2013-2016 qemu: virtio: out-of-bounds config space access
Summary: CVE-2013-2016 qemu: virtio: out-of-bounds config space access
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-2016
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 956953 957161
Blocks: 957189
TreeView+ depends on / blocked
 
Reported: 2013-04-26 13:27 UTC by Petr Matousek
Modified: 2019-09-29 13:03 UTC (History)
26 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-08-24 14:13:48 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Gentoo 467846 None None None Never
Novell 817593 None None None Never

Description Petr Matousek 2013-04-26 13:27:56 UTC
A flaw was found in the way qemu validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

References:

https://lists.gnu.org/archive/html/qemu-devel/2013-04/msg05013.html

Proposed upstream patch:

https://lists.gnu.org/archive/html/qemu-devel/2013-04/msg05254.html

Acknowledgements:                                  

This issue was found by Jason Wang of Red Hat.

Comment 1 Petr Matousek 2013-04-26 13:33:56 UTC
Statement:

Not vulnerable.

This issue does not affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5 and qemu-kvm package as shipped with Red Hat Enterprise Linux 6.

Comment 2 Petr Matousek 2013-04-26 13:35:29 UTC
Created qemu tracking bugs for this issue

Affects: fedora-all [bug 957161]


Note You need to log in before you can comment on or make changes to this bug.