CVE-2013-2016
30.12.2019, 22:15
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.Enginsight
| Vendor | Product | Version |
|---|---|---|
| qemu | qemu | 1.3.0 ≤ 𝑥 ≤ 1.4.2 |
| qemu | qemu | 1.5.0:rc1 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
| debian | debian_linux | 10.0 |
| novell | open_desktop_server | 11.0:sp3 |
| novell | open_enterprise_server | 11.0:sp3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| kvm |
| ||||||||||||||
| qemu |
| ||||||||||||||
| qemu-kvm |
| ||||||||||||||
| xen-3.1 |
| ||||||||||||||
| xen-3.2 |
| ||||||||||||||
| xen-3.3 |
|
Common Weakness Enumeration
References