Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 580040 (CVE-2016-4020)

Summary: <app-emulation/qemu-2.5.1: i386: leakage of stack memory to guest in kvmvapic.c
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html
See Also: https://bugzilla.redhat.com/show_bug.cgi?id=1313686
Whiteboard: B4 [glsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2016-04-15 07:01:02 UTC
From ${URL} :

Qemu emulator built with the Task Priority Register(TPR) optimizations for 32-bit Windows guests, 
is vulnerable to a information leakage issue. It could
occur while accessing Task Priority Register(TPR).

A privileged user/process inside guest could use this issue to leak host memory bytes.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/04/14/3


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 SpanKY gentoo-dev 2016-04-23 20:30:12 UTC
included fix in qemu-2.5.1.  should be fine for stable.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-06-21 09:03:07 UTC
@maintainer(s), please cleanup the vulnerable versions:

app-emulation/qemu-2.5.0-{r2,r3}
Comment 3 Matthias Maier gentoo-dev 2016-09-05 05:35:00 UTC
commit 01e6cb9bcad3046a7223e31c4b533485d6ca0877
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Sun Sep 4 22:58:05 2016 -0500

    app-emulation/qemu: remove vulnerable 2.5.0
    
    Package-Manager: portage-2.2.28
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2016-09-25 22:45:53 UTC
Added to an existing GLSA Request.
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2016-09-26 00:36:39 UTC
This issue was resolved and addressed in
 GLSA 201609-01 at https://security.gentoo.org/glsa/201609-01
by GLSA coordinator Yury German (BlueKnight).