Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 575492 (CVE-2016-2538)

Summary: <app-emulation/qemu-2.5.0-r2: usb: integer overflow in remote NDIS control message handling (CVE-2016-2538)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1303120
Whiteboard: B3 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 578044    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2016-02-23 17:05:49 UTC
From ${URL} :

Qemu emulator built with the USB Net device emulation support is vulnerable to an integer overflow issue. It could occur while processing remote NDIS control message packets. As the incoming informationBufferOffset & Length combination could cross the integer 
range.

A privileged user inside guest could use this flaw to leak host memory bytes to guest or crash the Qemu process instance resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/02/22/3


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 2 SpanKY gentoo-dev 2016-03-23 05:26:38 UTC
this is in qemu-2.5.0-r2 and is fine for stable
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-03-23 06:15:32 UTC
Added to existing GLSA.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2016-04-02 17:43:49 UTC
Clean as part of bug #567420
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2016-04-02 18:28:24 UTC
This issue was resolved and addressed in
 GLSA 201604-01 at https://security.gentoo.org/glsa/201604-01
by GLSA coordinator Yury German (BlueKnight).