First published: Fri Feb 26 2010(Updated: )
libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 and possibly other products, allows guest OS users to read from or write to arbitrary QEMU memory by modifying the address that is used by Cairo for memory mappings.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kvm | <0:83-164.el5 | 0:83-164.el5 |
redhat/rhev-hypervisor | <0:5.5-2.2.4.2.el5 | 0:5.5-2.2.4.2.el5 |
Red Hat Enterprise Virtualization Hypervisor | <=5.4-2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0430 has a medium severity rating due to its potential to allow unauthorized access to guest OS memory.
To fix CVE-2010-0430, update to the patched versions of kvm (0:83-164.el5) or rhev-hypervisor (0:5.5-2.2.4.2.el5) as recommended by Red Hat.
CVE-2010-0430 affects libspice used in QEMU-KVM within Red Hat Enterprise Virtualization Hypervisor prior to version 5.5-2.2.
Yes, CVE-2010-0430 can be exploited remotely by guest OS users if the vulnerability is present.
Exploitation of CVE-2010-0430 could allow guest OS users to read or write arbitrary QEMU memory, leading to data exposure or system instability.