Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 579614 - <app-emulation/qemu-2.5.1: net: buffer overflow in stellaris_enet emulator (CVE-2016-4001)
Summary: <app-emulation/qemu-2.5.1: net: buffer overflow in stellaris_enet emulator (C...
Status: RESOLVED DUPLICATE of bug 579734
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://git.qemu.org/?p=qemu.git;a=com...
Whiteboard: B2 [glsa?]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-04-11 12:44 UTC by Agostino Sarubbo
Modified: 2016-09-05 06:07 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-04-11 12:44:07 UTC
From ${URL} :

Qemu emulator built with the Luminary Micro Stellaris Ethernet Controller
is vulnerable to a buffer overflow issue. It could occur while receiving
network packets in stellaris_enet_receive(), if the guest NIC is configured
to accept large(MTU) packets.

A remote user/process could use this flaw to crash the Qemu process on a host,
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 SpanKY gentoo-dev 2016-04-23 20:30:08 UTC
included fix in qemu-2.5.1.  should be fine for stable.
Comment 2 Matthias Maier gentoo-dev 2016-09-05 05:32:43 UTC
qemu-2.5.1 is stable.
Comment 3 Matthias Maier gentoo-dev 2016-09-05 06:07:10 UTC
This is CVE-2016-4001 which is simultaneously handled in bug #579734 as well.

Upstream patch:

3a15cc0e1ee7168db0782133d2607a6bfa422d66 -> CVE-2016-4001, bug #579734

*** This bug has been marked as a duplicate of bug 579734 ***