Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 596776 (CVE-2016-8577)

Summary: <app-emulation/qemu-2.7.0-r5: 9pfs: host memory leakage in v9fs_read (CVE-2016-8577)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2016/10/10/7
Whiteboard: B4 [glsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2016-10-10 13:22:14 UTC
From ${URL} :

Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable 
to a memory leakage issue. It could occur while doing a I/O read operation in 
v9fs_read() routine.

A privileged user/process inside guest could use this flaw to crash the Qemu 
process instance resulting in Dos.

Upstream patch:
---------------
   -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07127.html




@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2016-10-26 21:53:30 UTC
Stabilization on bug #598046

commit 5a981e9d23127c779dc8ecb1d05ef08fe4d3a011
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Wed Oct 26 16:47:50 2016 -0500

    app-emulation/qemu: multiple security fixes for 2.7.0-r5
    
      CVE-2016-7907, bug 596048
      CVE-2016-7908, bug 596048
      CVE-2016-7909, bug 596048
      CVE-2016-7994, bug 596738
      CVE-2016-7994, bug 596738
      CVE-2016-8576, bug 596752
      CVE-2016-8577, bug 596776
      CVE-2016-8578, bug 596774
      CVE-2016-8668, bug 597110
      CVE-2016-8669, bug 597108
      CVE-2016-8669, bug 597108
      CVE-2016-8909, bug 598044
      CVE-2016-8910, bug 598046
    
    Package-Manager: portage-2.3.0
Comment 2 Matthias Maier gentoo-dev 2016-10-27 13:23:43 UTC
2.7.0-r5 is stable, all vulnerable versions dropped.

Security, please vote.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2016-11-18 23:13:09 UTC
This issue was resolved and addressed in
 GLSA 201611-11 at https://security.gentoo.org/glsa/201611-11
by GLSA coordinator Aaron Bauman (b-man).