Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 522364 (CVE-2014-3615) - <app-emulation/qemu-2.1.1: information leakage when guest sets high resolution (CVE-2014-3615)
Summary: <app-emulation/qemu-2.1.1: information leakage when guest sets high resolutio...
Status: RESOLVED FIXED
Alias: CVE-2014-3615
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B4 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-08 09:19 UTC by Agostino Sarubbo
Modified: 2014-12-08 22:48 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-09-08 09:19:03 UTC
From ${URL} :

An information leakage flaw was found in Qemu's VGA emulator. It could lead to
leaking host memory bytes to a VNC client. It could occur when a guest GOP
driver attempts to set a high display resolution.

A privileged user/program able to set such high resolution could use this flaw
to leak host memory bytes.

Upstream fixes:
---------------
   -> http://git.qemu.org/?p=qemu.git;a=commit;h=c1b886c45dc70f247300f549dce9833f3fa2def5
   -> http://git.qemu.org/?p=qemu.git;a=commit;h=ab9509cceabef28071e41bdfa073083859c949a7


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Agostino Sarubbo gentoo-dev 2014-10-22 14:37:26 UTC
Arches, please test and mark stable:                                                                                                                                                                                                                                           
=app-emulation/qemu-2.1.1                                                                                                                                                                                                                                                      
Target keywords : "amd64 x86"
Comment 2 Agostino Sarubbo gentoo-dev 2014-10-22 14:40:06 UTC
is bug 525446 a blocker for the stabilization
Comment 3 Agostino Sarubbo gentoo-dev 2014-10-22 14:40:40 UTC
(In reply to Agostino Sarubbo from comment #2)
> is bug 525446 a blocker for the stabilization

I missed the '?'. So it was a question.
Comment 4 SpanKY gentoo-dev 2014-10-22 19:13:44 UTC
(In reply to Agostino Sarubbo from comment #2)

not a blocker
Comment 5 Agostino Sarubbo gentoo-dev 2014-10-23 14:53:39 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-10-23 14:53:53 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 7 Thomas Stein 2014-10-23 16:55:52 UTC
Hello.

Are there specific patches for 2.1.1 included? Just asking because i had a lot of problems with this version. For example this one:

https://www.redhat.com/archives/libvirt-users/2014-September/msg00062.html

cheers
t.
Comment 8 Kristian Fiskerstrand gentoo-dev Security 2014-12-08 22:31:06 UTC
Added to existing GLSA request.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2014-12-08 22:48:42 UTC
This issue was resolved and addressed in
 GLSA 201412-01 at http://security.gentoo.org/glsa/glsa-201412-01.xml
by GLSA coordinator Kristian Fiskerstrand (K_F).