Bugzilla – Bug 874788
VUL-0: CVE-2014-0182: qemu: virtio: out-of-bounds buffer write on state load with invalid config_len
Last modified: 2017-08-03 14:18:05 UTC
Via rh#1088986: config_len is read during state load and later used as size argument when initializing vdev->config as follows: hw/virtio/virtio.c: virtio_load() vdev->config_len = qemu_get_be32(f); qemu_get_buffer(f, vdev->config, vdev->config_len); An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. CVE-2014-0182 was assigned to this issue. References: https://bugzilla.redhat.com/show_bug.cgi?id=1088986 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0182
Code streams affected (qemu/kvm): SLE-11-SP3 SLE-11-SP1-TD openSUSE:12.3 openSUSE:13.1 SLE-10-SP3/4 are not affected.
bugbot adjusting priority
This is an autogenerated message for OBS integration: This bug (874788) was mentioned in https://build.opensuse.org/request/show/235281 Factory / qemu
Update released for: kvm, kvm-debuginfo, kvm-debugsource Products: SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, s390x, x86_64)
SUSE-SU-2014:0816-1: An update that solves two vulnerabilities and has 20 fixes is now available. Category: security (moderate) Bug References: 864391,864649,864650,864653,864655,864665,864671,864673,864678,864682,864769,864796,864801,864802,864804,864805,864811,864812,864814,873235,874749,874788 CVE References: CVE-2014-0150,CVE-2014-2894 Sources used: SUSE Linux Enterprise Server 11 SP3 (src): kvm-1.4.2-0.15.2 SUSE Linux Enterprise Desktop 11 SP3 (src): kvm-1.4.2-0.15.2