Qemu emulator built with the AMD PC-Net II Ethernet Controller support is
vulnerable to a heap buffer overflow flaw. While receiving packets in the
loopback mode, it appends CRC code to the receive buffer. If the data size
given is same as the receive buffer size, the appended CRC code overwrites 4
bytes beyond this 's->buffer' array.
A privileged(CAP_SYS_RAWIO) user inside guest could use this flaw to crash the
Qemu instance resulting in DoS or potentially execute arbitrary code with
privileges of the Qemu process on the host.
CVE-2015-7504 has been assigned to this issue by Red Hat Inc.
The AMD PC-Net II emulator(hw/net/pcnet.c), while receiving packets from a
remote host(non-loopback mode), fails to validate the received data size, thus
resulting in a buffer overflow issue. It could potentially lead to arbitrary
code execution on the host, with privileges of the Qemu process. It requires
the guest NIC to have larger MTU limit.
A remote user could use this flaw to crash the guest instance resulting in DoS
or potentially execute arbitrary code on a remote host with privileges of the
CVE-2015-7512 has been assigned to this issue by Red Hat Inc.
@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
i've added the upstream fixes to 2.4.1-r1:
should be fine to stabilize
stabilized in another bug.
cleanup done by vapier
Arches and Maintainer(s), Thank you for your work.
Added to an existing GLSA Request.
This issue was resolved and addressed in
GLSA 201602-01 at https://security.gentoo.org/glsa/201602-01
by GLSA coordinator Kristian Fiskerstrand (K_F).