Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 522364 (CVE-2014-3615) - <app-emulation/qemu-2.1.1: information leakage when guest sets high resolution (CVE-2014-3615)
Summary: <app-emulation/qemu-2.1.1: information leakage when guest sets high resolutio...
Alias: CVE-2014-3615
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B4 [glsa]
Depends on:
Reported: 2014-09-08 09:19 UTC by Agostino Sarubbo
Modified: 2014-12-08 22:48 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-09-08 09:19:03 UTC
From ${URL} :

An information leakage flaw was found in Qemu's VGA emulator. It could lead to
leaking host memory bytes to a VNC client. It could occur when a guest GOP
driver attempts to set a high display resolution.

A privileged user/program able to set such high resolution could use this flaw
to leak host memory bytes.

Upstream fixes:

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Agostino Sarubbo gentoo-dev 2014-10-22 14:37:26 UTC
Arches, please test and mark stable:                                                                                                                                                                                                                                           
Target keywords : "amd64 x86"
Comment 2 Agostino Sarubbo gentoo-dev 2014-10-22 14:40:06 UTC
is bug 525446 a blocker for the stabilization
Comment 3 Agostino Sarubbo gentoo-dev 2014-10-22 14:40:40 UTC
(In reply to Agostino Sarubbo from comment #2)
> is bug 525446 a blocker for the stabilization

I missed the '?'. So it was a question.
Comment 4 SpanKY gentoo-dev 2014-10-22 19:13:44 UTC
(In reply to Agostino Sarubbo from comment #2)

not a blocker
Comment 5 Agostino Sarubbo gentoo-dev 2014-10-23 14:53:39 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-10-23 14:53:53 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 7 Thomas Stein 2014-10-23 16:55:52 UTC

Are there specific patches for 2.1.1 included? Just asking because i had a lot of problems with this version. For example this one:

Comment 8 Kristian Fiskerstrand gentoo-dev Security 2014-12-08 22:31:06 UTC
Added to existing GLSA request.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2014-12-08 22:48:42 UTC
This issue was resolved and addressed in
 GLSA 201412-01 at
by GLSA coordinator Kristian Fiskerstrand (K_F).