Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 630432 (CVE-2017-14167)

Summary: <app-emulation/qemu-2.10.1: on i386 is vulnerable to an OOB r/w memory access issue
Product: Gentoo Security Reporter: D'juan McDonald (domhnall) <flopwiki>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: x86   
OS: Linux   
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 634148    
Bug Blocks:    

Description D'juan McDonald (domhnall) 2017-09-08 22:52:51 UTC
Date: Thu, 7 Sep 2017 15:43:37 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: Thomas Garnier <thgarnie@...gle.com>
Subject: CVE-2017-14167 Qemu: i386: multiboot OOB access while loading guest
 kernel image

   Hello,

Quick Emulator(Qemu) built with the PC System Emulator with multiboot feature 
support is vulnerable to an OOB r/w memory access issue. It could occur due to 
an integer overflow while loading a kernel image during a guest boot.

A user/process could use this flaw to potentially achieve arbitrary code 
execution on a host.

Upstream patch:
---------------
   -> https://lists.nongnu.org/archive/html/qemu-devel/2017-09/msg01483.html

Reference:
----------
   -> https://bugzilla.redhat.com/show_bug.cgi?id=1489375

This issue was reported by Thomas Garnier of Google.com.

Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

----------------------------------------------------------

Daj Uan (jmbailey/mbailey_j)
Gentoo Security Padawan
Comment 1 Matthias Maier gentoo-dev 2017-09-09 03:23:06 UTC
Security, please reassess severity.
Comment 2 Larry the Git Cow gentoo-dev 2017-11-12 20:22:19 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=23224f9e55bfc2ec41c8a8906a44e60791de07b5

commit 23224f9e55bfc2ec41c8a8906a44e60791de07b5
Author:     Matthias Maier <tamiko@gentoo.org>
AuthorDate: 2017-11-12 20:10:34 +0000
Commit:     Matthias Maier <tamiko@gentoo.org>
CommitDate: 2017-11-12 20:22:03 +0000

    app-emulation/qemu: Version bump to 2.10.1, various security fixes
    
    Bug: https://bugs.gentoo.org/630432
    Bug: https://bugs.gentoo.org/633822
    Bug: https://bugs.gentoo.org/634070
    Bug: https://bugs.gentoo.org/634148
    Package-Manager: Portage-2.3.8, Repoman-2.3.4

 app-emulation/qemu/Manifest                        |   1 +
 .../qemu/files/qemu-2.10.0-CVE-2017-13711.patch    |  80 ---
 .../qemu/files/qemu-2.10.1-CVE-2017-15268.patch    |  54 ++
 .../qemu/files/qemu-2.10.1-CVE-2017-15289.patch    |  58 ++
 app-emulation/qemu/qemu-2.10.1.ebuild              | 796 +++++++++++++++++++++
 5 files changed, 909 insertions(+), 80 deletions(-)}