| Summary: | app-emulation/qemu: crypto: memory leakage in qcrypto_ivgen_essiv_init | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | minor | CC: | qemu+disabled |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1422656 | ||
| Whiteboard: | B4 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
This one turned out to be a non security issue, as guest could not trigger this memory leak. CVE has been cancelled, see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6000 |
From ${URL} : Quick Emulator(Qemu) built with the Crypto block IV generator - essiv support is vulnerable to a host memory leakage issue. It could occur while initialising the crypto device in 'qcrypto_ivgen_essiv_init'. A guest user/process could use this flaw to leak host memory resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg00295.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/02/16/2 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.