Bug 1140123 - VUL-0: CVE-2019-12929: xen: qemu: QEMU guest agent guest_exec command execution
VUL-0: CVE-2019-12929: xen: qemu: QEMU guest agent guest_exec command execution
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Critical
: ---
Assigned To: Charles Arnold
Security Team bot
https://smash.suse.de/issue/235640/
CVSSv3:RedHat:CVE-2019-12929:0.0:(AV...
:
Depends on: CVE-2019-12929
Blocks:
  Show dependency treegraph
 
Reported: 2019-07-02 16:11 UTC by Marcus Meissner
Modified: 2019-07-08 12:13 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2019-07-02 16:11:48 UTC
not sure if this affects XEN.

+++ This bug was initially created as a clone of Bug #1139671 +++

rh#1724809

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.

https://fakhrizulkifli.github.io/posts/2019/06/06/CVE-2019-12929/

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1724809
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12929
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12929.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12929
https://fakhrizulkifli.github.io/posts/2019/06/06/CVE-2019-12929/
Comment 1 Marcus Meissner 2019-07-08 08:26:34 UTC
is not in XEN qemu forks.