Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 591242 (CVE-2016-6836) - <app-emulation/qemu-2.7.0: net: vmxnet: Information leakage in vmxnet3_complete_packet (CVE-2016-6836)
Summary: <app-emulation/qemu-2.7.0: net: vmxnet: Information leakage in vmxnet3_comple...
Status: RESOLVED FIXED
Alias: CVE-2016-6836
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B4 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-08-14 10:27 UTC by Agostino Sarubbo
Modified: 2016-09-26 00:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-08-14 10:27:06 UTC
From ${URL} :

Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support
is vulnerable to an information leakage issue. It could occur while
processing transmit(tx) queue, when it reaches the end of packet.

A privileged user inside guest could use this leak host memory bytes
to a guest.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg02108.html


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2016-09-05 05:52:24 UTC
Fix applied to 2.7.0. Stabilization of 2.7.0 in #592430

commit ceb67390ecbe843f184b5bde6428cb9e2f3dcd81
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Mon Sep 5 00:18:46 2016 -0500

    app-emulation/qemu: apply patch for CVE-2016-6836, bug #591242
    
    Package-Manager: portage-2.2.28
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2016-09-10 03:35:05 UTC
Added to an existing GLSA Request.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2016-09-26 00:38:07 UTC
This issue was resolved and addressed in
 GLSA 201609-01 at https://security.gentoo.org/glsa/201609-01
by GLSA coordinator Yury German (BlueKnight).