Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 616460 (CVE-2017-8086)

Summary: <app-emulation/qemu-2.8.1-r2: 9pfs: host memory leakage via v9pfs_list_xattr (CVE-2017-8086)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: qemu+disabled
Priority: Normal Flags: stable-bot: sanity-check+
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1444781
Whiteboard: B3 [glsa cve]
Package list:
=app-emulation/qemu-2.8.1-r2
Runtime testing required: ---
Bug Depends on:    
Bug Blocks: 615874, 616462, 616482, 616484    

Description Agostino Sarubbo gentoo-dev 2017-04-24 11:30:59 UTC
From ${URL} :

Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable
to a memory leakage issue. It could occur while querying file system extended
attributes via 9pfs_list_xattr() routine.

A privileged user/process inside guest could use this flaw to leak host memory
resulting in Dos.

Upstream patch:
---------------
    -> http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2017-04-25 13:54:36 UTC
commit 51d94aaeff0e35fa68711f5623c5e6f68be2fac8
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Tue Apr 25 08:32:43 2017 -0500

    app-emulation/qemu: security fixes
    
    CVE-2017-7471, bug #616484
    
    CVE-2017-7718, bug #616482
      already applied on stable-2.8 as 3328c14e63f08fb07e8c6dec779c9d365e9e9864
    
    CVE-2017-7980, bug #616462
      already applied on stable-2.8 as a290442234fa214fcb7f45fc91d802bcb8d05c4b
                                       031700e4527b9e05798f7040dccdf638da27aee2
    
    CVE-2017-8086, bug #616460
    
    Package-Manager: Portage-2.3.5, Repoman-2.3.2
Comment 2 Agostino Sarubbo gentoo-dev 2017-04-29 14:49:26 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2017-05-04 15:56:20 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 4 Matthias Maier gentoo-dev 2017-05-04 17:05:49 UTC
commit 3ebfbe4800b59d6cf81a3a2f4e1a9a2e641343f3
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Thu May 4 12:03:54 2017 -0500

    app-emulation/qemu: drop vulnerable, bug #616460
    
    Package-Manager: Portage-2.3.5, Repoman-2.3.2
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2017-05-05 01:28:23 UTC
Arches and Maintainer(s), Thank you for your work.

Added to an existing GLSA Request.
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2017-06-06 06:49:05 UTC
This issue was resolved and addressed in
 GLSA 201706-03 at https://security.gentoo.org/glsa/201706-03
by GLSA coordinator Yury German (BlueKnight).