Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 630432 (CVE-2017-14167) - <app-emulation/qemu-2.10.1: on i386 is vulnerable to an OOB r/w memory access issue
Summary: <app-emulation/qemu-2.10.1: on i386 is vulnerable to an OOB r/w memory access...
Status: RESOLVED FIXED
Alias: CVE-2017-14167
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: x86 Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on: CVE-2017-15289
Blocks:
  Show dependency tree
 
Reported: 2017-09-08 22:52 UTC by D'juan McDonald (domhnall)
Modified: 2017-11-19 18:56 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2017-09-08 22:52:51 UTC
Date: Thu, 7 Sep 2017 15:43:37 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: Thomas Garnier <thgarnie@...gle.com>
Subject: CVE-2017-14167 Qemu: i386: multiboot OOB access while loading guest
 kernel image

   Hello,

Quick Emulator(Qemu) built with the PC System Emulator with multiboot feature 
support is vulnerable to an OOB r/w memory access issue. It could occur due to 
an integer overflow while loading a kernel image during a guest boot.

A user/process could use this flaw to potentially achieve arbitrary code 
execution on a host.

Upstream patch:
---------------
   -> https://lists.nongnu.org/archive/html/qemu-devel/2017-09/msg01483.html

Reference:
----------
   -> https://bugzilla.redhat.com/show_bug.cgi?id=1489375

This issue was reported by Thomas Garnier of Google.com.

Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

----------------------------------------------------------

Daj Uan (jmbailey/mbailey_j)
Gentoo Security Padawan
Comment 1 Matthias Maier gentoo-dev 2017-09-09 03:23:06 UTC
Security, please reassess severity.
Comment 2 Larry the Git Cow gentoo-dev 2017-11-12 20:22:19 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=23224f9e55bfc2ec41c8a8906a44e60791de07b5

commit 23224f9e55bfc2ec41c8a8906a44e60791de07b5
Author:     Matthias Maier <tamiko@gentoo.org>
AuthorDate: 2017-11-12 20:10:34 +0000
Commit:     Matthias Maier <tamiko@gentoo.org>
CommitDate: 2017-11-12 20:22:03 +0000

    app-emulation/qemu: Version bump to 2.10.1, various security fixes
    
    Bug: https://bugs.gentoo.org/630432
    Bug: https://bugs.gentoo.org/633822
    Bug: https://bugs.gentoo.org/634070
    Bug: https://bugs.gentoo.org/634148
    Package-Manager: Portage-2.3.8, Repoman-2.3.4

 app-emulation/qemu/Manifest                        |   1 +
 .../qemu/files/qemu-2.10.0-CVE-2017-13711.patch    |  80 ---
 .../qemu/files/qemu-2.10.1-CVE-2017-15268.patch    |  54 ++
 .../qemu/files/qemu-2.10.1-CVE-2017-15289.patch    |  58 ++
 app-emulation/qemu/qemu-2.10.1.ebuild              | 796 +++++++++++++++++++++
 5 files changed, 909 insertions(+), 80 deletions(-)}