Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 596048 (CVE-2016-7907, CVE-2016-7908, CVE-2016-7909)

Summary: <app-emulation/qemu-2.7.0-r5: multiple infinite loop (CVE-2016-{7907|7908|7909})
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [glsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2016-10-03 14:57:51 UTC
From http://www.openwall.com/lists/oss-security/2016/10/03/1:

Quick Emulator(Qemu) built with the i.MX Fast Ethernet Controller emulator 
support is vulnerable to an infinite loop issue. It could occur while 
processing packets on the transmit queue in 'imx_fec_do_tx'.

A privileged user/process inside guest could use this issue to crash the Qemu 
process on the host leading to DoS.

Upstream patch
--------------
   -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05556.html


From http://www.openwall.com/lists/oss-security/2016/10/03/2:

Quick Emulator(Qemu) built with the ColdFire Fast Ethernet Controller emulator 
support is vulnerable to an infinite loop issue. It could occur while 
processing packets on the transmit queue in 'mcf_fec_do_tx'.

A privileged user/process inside guest could use this issue to crash the Qemu 
process on the host leading to DoS.

Upstream patch
--------------
   -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05557.html



From http://www.openwall.com/lists/oss-security/2016/10/03/3:

Quick Emulator(Qemu) built with the AMD PC-Net II emulator support is 
vulnerable to an infinite loop issue. It could occur while receiving packets 
via pcnet_receive().

A privileged user/process inside guest could use this issue to crash the Qemu 
process on the host leading to DoS.

Upstream patch
--------------
   -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07942.html




@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2016-10-26 21:51:40 UTC
Stabilization on bug #598046

commit 5a981e9d23127c779dc8ecb1d05ef08fe4d3a011
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Wed Oct 26 16:47:50 2016 -0500

    app-emulation/qemu: multiple security fixes for 2.7.0-r5
    
      CVE-2016-7466, bug 594520
      CVE-2016-7907, bug 596048
      CVE-2016-7908, bug 596049
      CVE-2016-7909, bug 596048
      CVE-2016-7994, bug 596738
      CVE-2016-7994, bug 596738
      CVE-2016-8576, bug 596752
      CVE-2016-8577, bug 596776
      CVE-2016-8578, bug 596774
      CVE-2016-8668, bug 597110
      CVE-2016-8669, bug 597108
      CVE-2016-8669, bug 597108
      CVE-2016-8909, bug 598044
      CVE-2016-8910, bug 598046
    
    Package-Manager: portage-2.3.0
Comment 2 Matthias Maier gentoo-dev 2016-10-27 13:22:54 UTC
2.7.0-r5 is stable, all vulnerable versions dropped.

Security, please vote.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2016-11-18 23:12:38 UTC
This issue was resolved and addressed in
 GLSA 201611-11 at https://security.gentoo.org/glsa/201611-11
by GLSA coordinator Aaron Bauman (b-man).