Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 598046 (CVE-2016-8910) - <app-emulation/qemu-2.7.0-r5: net: rtl8139: infinite loop while transmit in C+ mode (CVE-2016-8910)
Summary: <app-emulation/qemu-2.7.0-r5: net: rtl8139: infinite loop while transmit in C...
Status: RESOLVED FIXED
Alias: CVE-2016-8910
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-10-25 07:49 UTC by Agostino Sarubbo
Modified: 2016-11-18 23:13 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-10-25 07:49:11 UTC
From ${URL} :

Quick Emulator(Qemu) built with the RTL8139 ethernet controller emulation
support is vulnerable to an infinite loop issue. It could occur while
transmitting packets in C+ mode of operation.

A privileged user inside guest could use this flaw to consume excessive CPU
cycles on the host, resulting in DoS situation.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05495.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/10/24/5


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2016-10-26 21:54:42 UTC
Stabilization on bug #598046

commit 5a981e9d23127c779dc8ecb1d05ef08fe4d3a011
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Wed Oct 26 16:47:50 2016 -0500

    app-emulation/qemu: multiple security fixes for 2.7.0-r5
    
      CVE-2016-7907, bug 596048
      CVE-2016-7908, bug 596048
      CVE-2016-7909, bug 596048
      CVE-2016-7994, bug 596738
      CVE-2016-7994, bug 596738
      CVE-2016-8576, bug 596752
      CVE-2016-8577, bug 596776
      CVE-2016-8578, bug 596774
      CVE-2016-8668, bug 597110
      CVE-2016-8669, bug 597108
      CVE-2016-8669, bug 597108
      CVE-2016-8909, bug 598044
      CVE-2016-8910, bug 598046
    
    Package-Manager: portage-2.3.0
Comment 2 Matthias Maier gentoo-dev 2016-10-27 03:52:38 UTC
Arches, please stabilize

 =app-emulation/qemu-2.7.0-r5

Target-keywords: amd64 x86
Comment 3 Agostino Sarubbo gentoo-dev 2016-10-27 08:52:08 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2016-10-27 08:53:24 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 5 Matthias Maier gentoo-dev 2016-10-27 13:21:02 UTC
commit 2ae8f001543518b0de297a67f70e5988bb30365c
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Thu Oct 27 08:19:13 2016 -0500

    app-emulation/qemu: drop vulnerable 2.7.0-r4, bug #598046
    
    Package-Manager: portage-2.3.0
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2016-11-18 23:13:39 UTC
This issue was resolved and addressed in
 GLSA 201611-11 at https://security.gentoo.org/glsa/201611-11
by GLSA coordinator Aaron Bauman (b-man).