Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 634148 (CVE-2017-15289) - <app-emulation/qemu-2.10.1: cirrus: OOB access issue in mode4and5 write functions
Summary: <app-emulation/qemu-2.10.1: cirrus: OOB access issue in mode4and5 write funct...
Status: RESOLVED FIXED
Alias: CVE-2017-15289
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks: CVE-2017-14167 CVE-2017-15038
  Show dependency tree
 
Reported: 2017-10-13 07:59 UTC by Agostino Sarubbo
Modified: 2017-11-15 00:40 UTC (History)
1 user (show)

See Also:
Package list:
=app-emulation/qemu-2.10.1 =sys-apps/dtc-1.4.4
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-10-13 07:59:01 UTC
From ${URL} :

Quick emulator(Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to an out-of-bounds write access issues. It could occur while writing
to VGA memory via mode4and5 write functions.

A privileged user inside guest could use this flaw to crash the Qemu process
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02557.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/10/12/16


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Larry the Git Cow gentoo-dev 2017-11-12 20:22:23 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=23224f9e55bfc2ec41c8a8906a44e60791de07b5

commit 23224f9e55bfc2ec41c8a8906a44e60791de07b5
Author:     Matthias Maier <tamiko@gentoo.org>
AuthorDate: 2017-11-12 20:10:34 +0000
Commit:     Matthias Maier <tamiko@gentoo.org>
CommitDate: 2017-11-12 20:22:03 +0000

    app-emulation/qemu: Version bump to 2.10.1, various security fixes
    
    Bug: https://bugs.gentoo.org/630432
    Bug: https://bugs.gentoo.org/633822
    Bug: https://bugs.gentoo.org/634070
    Bug: https://bugs.gentoo.org/634148
    Package-Manager: Portage-2.3.8, Repoman-2.3.4

 app-emulation/qemu/Manifest                        |   1 +
 .../qemu/files/qemu-2.10.0-CVE-2017-13711.patch    |  80 ---
 .../qemu/files/qemu-2.10.1-CVE-2017-15268.patch    |  54 ++
 .../qemu/files/qemu-2.10.1-CVE-2017-15289.patch    |  58 ++
 app-emulation/qemu/qemu-2.10.1.ebuild              | 796 +++++++++++++++++++++
 5 files changed, 909 insertions(+), 80 deletions(-)}
Comment 2 Matthias Maier gentoo-dev 2017-11-12 20:25:35 UTC
Arches, please stabilize
  =app-emulation/qemu-2.10.1

Target keywords: amd64 x86
Comment 3 Stabilization helper bot gentoo-dev 2017-11-12 21:01:02 UTC
An automated check of this bug failed - repoman reported dependency errors (41 lines truncated): 

> dependency.bad app-emulation/qemu/qemu-2.10.1.ebuild: DEPEND: amd64(default/linux/amd64/13.0) ['>=sys-apps/dtc-1.4.2', '>=sys-apps/dtc-1.4.2[static-libs(+)]']
> dependency.bad app-emulation/qemu/qemu-2.10.1.ebuild: RDEPEND: amd64(default/linux/amd64/13.0) ['>=sys-apps/dtc-1.4.2']
> dependency.bad app-emulation/qemu/qemu-2.10.1.ebuild: DEPEND: amd64(default/linux/amd64/13.0/desktop) ['>=sys-apps/dtc-1.4.2', '>=sys-apps/dtc-1.4.2[static-libs(+)]']
Comment 4 Thomas Deutschmann gentoo-dev Security 2017-11-13 00:51:25 UTC
x86 stable
Comment 5 Manuel Rüger (RETIRED) gentoo-dev 2017-11-13 18:23:26 UTC
Stable on amd64
Comment 6 Matthias Maier gentoo-dev 2017-11-15 00:23:48 UTC
Tree clean.

commit ad6a584de881ebd244ba176a408e61704a8a6b21 (HEAD -> master, origin/master, origin/HEAD)
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Tue Nov 14 18:21:36 2017 -0600

    app-emulation/qemu: drop vulnerable  (bug #634148)
    
    Package-Manager: Portage-2.3.13, Repoman-2.3.4
Comment 7 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-11-15 00:40:38 UTC
Thank you.

GLSA Vote: No