Bugzilla – Bug 864802
VUL-0: CVE-2013-4541: qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load
Last modified: 2016-01-19 15:40:41 UTC
CVE-2013-4541 s->setup_len and s->setup_index are fed into usb_packet_copy as size/offset into s->data_buf, it's possible for invalid state to exploit this to load arbitrary data. An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4541 https://bugzilla.redhat.com/show_bug.cgi?id=1066384
bugbot adjusting priority
Update released for: kvm, kvm-debuginfo, kvm-debugsource Products: SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, s390x, x86_64)
SUSE-SU-2014:0623-1: An update that fixes 9 vulnerabilities is now available. Category: security (important) Bug References: 812983,817593,842006,864802,870439 CVE References: CVE-2013-2016,CVE-2013-4344,CVE-2013-4541,CVE-2014-0142,CVE-2014-0143,CVE-2014-0144,CVE-2014-0145,CVE-2014-0146,CVE-2014-0147 Sources used: SUSE Linux Enterprise Server 11 SP3 (src): kvm-1.4.2-0.11.1 SUSE Linux Enterprise Desktop 11 SP3 (src): kvm-1.4.2-0.11.1
The SWAMPID for this issue is 57320. This issue was rated as moderate. Please submit fixed packages until 2014-05-26. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
This is an autogenerated message for OBS integration: This bug (864802) was mentioned in https://build.opensuse.org/request/show/235281 Factory / qemu
SUSE-SU-2014:0816-1: An update that solves two vulnerabilities and has 20 fixes is now available. Category: security (moderate) Bug References: 864391,864649,864650,864653,864655,864665,864671,864673,864678,864682,864769,864796,864801,864802,864804,864805,864811,864812,864814,873235,874749,874788 CVE References: CVE-2014-0150,CVE-2014-2894 Sources used: SUSE Linux Enterprise Server 11 SP3 (src): kvm-1.4.2-0.15.2 SUSE Linux Enterprise Desktop 11 SP3 (src): kvm-1.4.2-0.15.2
everything fixed