Summary: | <app-emulation/qemu-2.5.0-r1: net: vmxnet3: reading IMR registers leads to a crash (CVE-2015-8745) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/01/04/4 | ||
Whiteboard: | B3 [glsa cve cleanup] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-01-11 17:01:14 UTC
this is included in the 2.5.0 release in the tree. no plans to backport to 2.4. The stabilization happened in bug 571566 CVE-2015-8745 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8745): A reachable-assertion flaw was found in the QEMU emulator built with VMWARE-VMXNET3 paravirtualized NIC emulator support. The flaw could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could exploit this flaw to crash the QEMU process instance, resulting in denial of service. Added to existing GLSA draft This issue was resolved and addressed in GLSA 201602-01 at https://security.gentoo.org/glsa/201602-01 by GLSA coordinator Kristian Fiskerstrand (K_F). |