An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1066401 | Issue Tracking Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210727-0002/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1066401 | Issue Tracking Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210727-0002/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1066401 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210727-0002/ - Third Party Advisory |
Information
Published : 2021-05-28 17:15
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4536
Mitre link : CVE-2013-4536
CVE.ORG link : CVE-2013-4536
JSON object : View
Products Affected
qemu
- qemu
CWE
CWE-269
Improper Privilege Management