| Summary: | qemu-kvm security update | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Jérôme Soyer <saispo> |
| Component: | Security | Assignee: | Mageia Bug Squad <bugsquad> |
| Status: | RESOLVED DUPLICATE | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | cjw, fundawang, mageia, misc, thierry.vignaud |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | qemu-0.14.0-5.mga1.src.rpm | CVE: | |
| Status comment: | |||
| Attachments: | Patch for CVE-2011-2212 | ||
|
Description
Jérôme Soyer
2011-05-25 19:19:08 CEST
CVE-2011-2512 Nelson Elhage discoverd that QEMU did not properly validate certain virtqueue requests from the guest. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Upstream patch: http://patchwork.ozlabs.org/patch/94604/ CC:
(none) =>
boklm Oops, wrong text for CVE-2011-2512. Correct one : Stefan Hajnoczi discovered that QEMU did not properly perform integer comparisons when performing virtqueue input validation. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. And CVE-2011-2212 : Nelson Elhage discoverd that QEMU did not properly validate certain virtqueue requests from the guest. An attacker could exploit this to cause a denial of service of the guest or possibly execute code with the privileges of the user invoking the program. Created attachment 639 [details]
Patch for CVE-2011-2212
Patch extracted from redhat qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpm
bolkm or saispo, can you work on this security issue ?
Manuel Hiebel
2011-08-30 09:48:53 CEST
CC:
(none) =>
cjw, fundawang, mageia, misc, thierry.vignaud Filed twice. *** This bug has been marked as a duplicate of bug 2063 *** Status:
NEW =>
RESOLVED
Nicolas Vigier
2014-05-08 18:07:14 CEST
CC:
boklm =>
(none) |