Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 579614

Summary: <app-emulation/qemu-2.5.1: net: buffer overflow in stellaris_enet emulator (CVE-2016-4001)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.qemu.org/?p=qemu.git;a=commit;h=53343338a6e7b83777b82803398572b40afc8c0f
See Also: https://bugzilla.redhat.com/show_bug.cgi?id=1325884
Whiteboard: B2 [glsa?]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2016-04-11 12:44:07 UTC
From ${URL} :

Qemu emulator built with the Luminary Micro Stellaris Ethernet Controller
is vulnerable to a buffer overflow issue. It could occur while receiving
network packets in stellaris_enet_receive(), if the guest NIC is configured
to accept large(MTU) packets.

A remote user/process could use this flaw to crash the Qemu process on a host,
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 SpanKY gentoo-dev 2016-04-23 20:30:08 UTC
included fix in qemu-2.5.1.  should be fine for stable.
Comment 2 Matthias Maier gentoo-dev 2016-09-05 05:32:43 UTC
qemu-2.5.1 is stable.
Comment 3 Matthias Maier gentoo-dev 2016-09-05 06:07:10 UTC
This is CVE-2016-4001 which is simultaneously handled in bug #579734 as well.

Upstream patch:

3a15cc0e1ee7168db0782133d2607a6bfa422d66 -> CVE-2016-4001, bug #579734

*** This bug has been marked as a duplicate of bug 579734 ***