Summary: | <app-emulation/qemu-2.0.0: virtio-net "virtio_net_handle_mac()" Integer Overflow Vulnerability (CVE-2014-0150) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | cardoe, qemu+disabled, raimue, schinkelm |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/57878/ | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 507790 |
Description
Agostino Sarubbo
2014-04-16 07:53:01 UTC
I've verified that this is fixed in app-emulation/qemu-2.0.0. Qemu-Guys: is qemu-2.0.0 ready for stabilization? let's give it ~30 days and stabilize it ok, let's start stabilizing qemu-2.0.0 CVE-2014-0150 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0150): Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow. amd64 stable x86 stable ppc and ppc64 has no stable keyword. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work Maintainer(s), please drop the vulnerable version. New GLSA Request filed. cleanup done This issue was resolved and addressed in GLSA 201408-17 at http://security.gentoo.org/glsa/glsa-201408-17.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |