Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 625390 (CVE-2017-11334) - <app-emulation/qemu-2.9.0-r55: exec: oob access during dma operation
Summary: <app-emulation/qemu-2.9.0-r55: exec: oob access during dma operation
Alias: CVE-2017-11334
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B3 [noglsa cve]
Depends on: CVE-2017-11434
  Show dependency tree
Reported: 2017-07-17 07:52 UTC by Agostino Sarubbo
Modified: 2017-09-03 22:50 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-07-17 07:52:52 UTC
From ${URL} :

Qemu emulator built to use 'qemu_map_ram_ptr' to access guests' ram block area
is vulnerable to a OOB r/w access issue. It could occur during a DMA operation.

A privileged user inside guest could use this flaw to crash the guest instance
resulting in DoS.

Upstream patch:

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2017-07-26 17:17:12 UTC
commit e67f10960bca69fdede54d77eb54c4ab72b98d08
Author: Matthias Maier <>
Date:   Wed Jul 26 12:10:46 2017 -0500

    app-emulation/qemu: security fixes
      CVE-2017-11334, bug #621292
      CVE-2017-11434, bug #625614
      CVE-2017-9503, bug #621184
      CVE-2017-9524, bug #621292
    Package-Manager: Portage-2.3.6, Repoman-2.3.3