Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20130416085528.GD5828@dhcp-25-225.brq.redhat.com>
Date: Tue, 16 Apr 2013 10:55:28 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2013-1922 -- qemu: qemu-nbd block format auto-detection
 vulnerability

A security flaw was found in the way qemu-nbd, the QEMU Disk Network
Block Device server tool of QEMU, performed detection of image formats
(the image format has been previously autodetected). A guest operating
system administrator could write a header to particular raw disk image
format, describing another format than original one for that disk image,
leading to scenario in which after restart of that guest, QEMU would
detect new format of the image, and could allow the guest to read any
file on the host if QEMU was sufficiently privileged.

This issue was found by Daniel Berrange of Red Hat.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=923219
http://www.openwall.com/lists/oss-security/2013/04/15/3

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.