Summary: | <app-emulation/qemu-2.1.0-r1: out of bounds memory access in ACPI PCI hotplug interface (CVE-2014-5388) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1132956 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-08-23 11:30:38 UTC
This is fixed in =app-emulation/qemu-2.1.0-r1 and we will wait a bit for the stabilization. i was waiting for the patch to be merged upstream since it didn't seem to be critical (and we haven't treated any other QEMU security issue as critical), so i don't know why you decided to jump in now your patch is named wrong, and lacks relevant metadata. please read this doc before committing patches in the future: http://dev.gentoo.org/~vapier/clean-patches Commit message: Clean up CVE patch http://sources.gentoo.org/app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch?rev=1.1 http://sources.gentoo.org/app-emulation/qemu/qemu-2.1.0-r1.ebuild?r1=1.1&r2=1.2 (In reply to SpanKY from comment #2) > i was waiting for the patch to be merged upstream since it didn't seem to be > critical (and we haven't treated any other QEMU security issue as critical), > so i don't know why you decided to jump in now > > your patch is named wrong, and lacks relevant metadata. please read this > doc before committing patches in the future: > http://dev.gentoo.org/~vapier/clean-patches Great guide. Would be great if this reference will be in the wiki instead of personal devspace. With a few QEMU bugs waiting for stabilization, making this one the master for those. As per Vapier, waited 30 days for regular testing. Arches, please test and mark stable: =app-emulation/qemu-2.1.0-r1 Target Keywords : "amd64 ppc ppc64 x86" Thank you! ppc and ppc64 has no stable keywords amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. cleanup done. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. CVE-2014-5388 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5388): Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption. This issue was resolved and addressed in GLSA 201412-01 at http://security.gentoo.org/glsa/glsa-201412-01.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |