First published: Mon Dec 30 2019(Updated: )
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | >=1.3.0<=1.4.2 | |
QEMU qemu | =1.5.0-rc1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Novell Open Desktop Server | =11.0-sp3 | |
Novell Open Enterprise Server | =11.0-sp3 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u6 1:8.2.4+ds-1 1:9.0.2+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-2016 is high with a CVSS score of 7.8.
QEMU versions 1.3.0 and later, as well as Debian Linux 8.0, 9.0, and 10.0, Novell Open Desktop Server 11.0-sp3, and Novell Open Enterprise Server 11.0-sp3 are affected by CVE-2013-2016.
A privileged guest user can exploit CVE-2013-2016 by accessing the config space of a virtio device with zero/small sized config space, such as virtio-rng.
To fix CVE-2013-2016, upgrade to a fixed version of QEMU, such as 1.3.0+dfsg-8+deb10u8 or higher, 1.3.0+dfsg-8+deb10u11 or higher, 1.5.0+dfsg-11+deb11u3 or higher, 1.5.0+dfsg-11+deb11u2 or higher, 1.7.2+dfsg-7+deb12u2 or higher, 8.1.1+ds-2 or higher, or 8.1.2+ds-1 or higher.
You can find more information about CVE-2013-2016 at the following references: [link](http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html), [link](http://www.openwall.com/lists/oss-security/2013/04/29/5), [link](http://www.openwall.com/lists/oss-security/2013/04/29/6).