Bug 40920 - qemu: multiple issues (4.1)
qemu: multiple issues (4.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.1
Other Linux
: P3 normal (vote)
: UCS 4.1-4-errata
Assigned To: Arvid Requate
Philipp Hahn
http://anonscm.debian.org/cgit/collab...
:
: 42552 (view as bug list)
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2016-03-17 16:56 CET by Arvid Requate
Modified: 2016-12-01 11:57 CET (History)
2 users (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score:
requate: Patch_Available+


Attachments
CVE-2016-371x.diff from Debian Jessie qemu package (18.49 KB, patch)
2016-05-23 17:35 CEST, Arvid Requate
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2016-03-17 16:56:42 CET
+++ This bug was initially created as a clone of Bug #40634 +++

Upstream Debian package version 1.1.2+dfsg-6a+deb7u12 fixes these issues:

* virtio-net: possible remote DoS (CVE-2015-7295)

* net: pcnet: heap overflow vulnerability in loopback mode (CVE-2015-7504)

* Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. (CVE-2015-7512)

* Qemu: net: eepro100: infinite loop in processing command block list (CVE-2015-8345)

* vnc: avoid floating point exception (CVE-2015-8504)

* usb: infinite loop in ehci_advance_state results in DoS (CVE-2015-8558)

* net: ne2000: OOB r/w in ioport operations (CVE-2015-8743)

* ide: ahci use-after-free vulnerability in aio port commands (CVE-2016-1568)

* nvram: OOB r/w access in processing firmware configurations (CVE-2016-1714)

* i386: null pointer dereference in vapic_write() (CVE-2016-1922)
Comment 1 Arvid Requate univentionstaff 2016-05-23 17:35:22 CEST
Created attachment 7678 [details]
CVE-2016-371x.diff from Debian Jessie qemu package

Two additional issues:

* The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS users to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue. (CVE-2016-3710)

* Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode. (CVE-2016-3712)


The source package "qemu-kvm" is not supported in Wheezy LTS. The attached patches have been extracted from the Debian Jessie "qemu" source package.
Comment 2 Erik Damrose univentionstaff 2016-05-24 09:53:17 CEST
@Arvid: I think comment#0 may be a duplicate of bug #40634, can you verify this?
Comment 3 Arvid Requate univentionstaff 2016-05-24 12:02:50 CEST
In Wheezy they are different source packages:

* https://packages.debian.org/source/wheezy/qemu-kvm
* https://packages.debian.org/source/wheezy/qemu
Comment 4 Arvid Requate univentionstaff 2016-05-24 12:11:58 CEST
Ok, as discussed, Philipp fixed the issues of comment#0 via Bug 40634 Comment 3.

Maybe we simply use this bug as it's rightful successor and track the issues of Comment 1 (and later).
Comment 5 Arvid Requate univentionstaff 2016-08-09 20:03:02 CEST
Upstream Debian package version 1.1.2+dfsg-6a+deb7u13 fixes these issues:

* The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue. (CVE-2016-3710)

* Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode. (CVE-2016-3712)

CVE-2016-3710: CVSS v2 base score: 6.5 (AV:A/AC:H/Au:S/C:C/I:C/A:C)
CVE-2016-3712: CVSS v2 base score: 3.8 (AV:A/AC:M/Au:S/C:P/I:N/A:P)
Comment 6 Arvid Requate univentionstaff 2016-08-09 20:03:52 CEST
Upstream Debian package version 1.1.2+dfsg-6+deb7u14 fixes these issues:

* The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet. (CVE-2016-2857)

* The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors. (CVE-2016-4439)

* scsi: esp: oob write access while reading ESP command (CVE-2016-6351)

CVE-2016-2857: CVSS v2 base score: 4.3 (AV:A/AC:M/Au:N/C:P/I:N/A:P)
CVE-2016-4439: CVSS v2 base score: 4 (AV:A/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-6351: CVSS v2 base score: 4 (AV:A/AC:H/Au:S/C:P/I:P/A:P)
Comment 7 Arvid Requate univentionstaff 2016-08-09 21:45:48 CEST
The package qemu-kvm is now also updated in wheezy-lts.
Comment 8 Arvid Requate univentionstaff 2016-08-09 21:50:57 CEST
Additional issues fixed in 1.1.2+dfsg-6+deb7u14:

* Integer overflow in vnc_client_read() and protocol_client_msg() (CVE-2015-5239)

* The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR). (CVE-2016-4020)

* The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion. (CVE-2016-5403)
Comment 9 Arvid Requate univentionstaff 2016-10-04 15:37:45 CEST
Upstream Debian package version 1.1.2+dfsg-6+deb7u15 fixes this additional issue:

* 9p: directory traversal flaw in 9p virtio backend (CVE-2016-7116)
Comment 10 Arvid Requate univentionstaff 2016-10-13 14:59:54 CEST
Fixed in upstream Debian package version 1.1.2+dfsg-6+deb7u16:

* Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet. (CVE-2016-7161)

* vmware_vga: OOB stack memory access when processing svga command (CVE-2016-7170)

* The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags. (CVE-2016-7908)
Comment 11 Arvid Requate univentionstaff 2016-11-05 20:33:18 CET
Upstream Debian package version 1.1.2+dfsg-6+deb7u17 fixes these issues:

* usb: xHCI: infinite loop vulnerability in xhci_ring_fetch (CVE-2016-8576)
* 9pfs: host memory leakage in v9fs_read (CVE-2016-8577)
* 9pfs: potential NULL dereferencein 9pfs routines (CVE-2016-8578)
* char: divide by zero error in serial_update_parameters (CVE-2016-8669)
Comment 12 Arvid Requate univentionstaff 2016-11-05 20:34:07 CET
*** Bug 42552 has been marked as a duplicate of this bug. ***
Comment 13 Arvid Requate univentionstaff 2016-11-08 18:48:56 CET
Another issue has been reported:

* usb: xhci memory leakage during device unplug (CVE-2016-7466)

[wheezy] - qemu <no-dsa> (Minor issue, needs qemu monitor access to unplug nec-xhci controller)
Comment 14 Arvid Requate univentionstaff 2016-11-08 18:54:31 CET
Upstream Debian package versions 1.1.2+dfsg-6+deb7u18 fix these issues:

* net: pcnet: check rx/tx descriptor ring length (CVE-2016-7909)
* audio: intel-hda: check stream entry count during transfer (CVE-2016-8909)
* net: rtl8139: limit processing of ring descriptors (CVE-2016-8910)
* net: eepro100: fix memory leak in device uninit (CVE-2016-9101)
* 9pfs: fix information leak in xattr read (CVE-2016-9102)
* 9pfs: fix memory leak in v9fs_xattrcreate (CVE-2016-9103)
* 9pfs: fix integer overflow issue in xattr read/write (CVE-2016-9104)
* 9pfs: fix memory leak in v9fs_link (CVE-2016-9105)
* 9pfs: fix memory leak in v9fs_write (CVE-2016-9106)
Comment 15 Arvid Requate univentionstaff 2016-11-08 18:55:29 CET
Of those qemu-kvm is only affected by CVE-2016-7909 CVE-2016-8909 CVE-2016-8910.
Comment 16 Arvid Requate univentionstaff 2016-11-10 21:20:50 CET
Advisories:
* qemu.yaml
* qemu-kvm.yaml
Comment 17 Philipp Hahn univentionstaff 2016-11-29 17:28:58 CET
OK: errata-announce -V --only qemu.yaml
OK: errata-announce -V --only qemu-kvm.yaml
FIXED: qemu.yaml qemu-kvm.yaml # r74812

OK: aptitude install '?source-package(qemu)~i'
OK: zless /usr/share/doc/qemu-kvm/changelog.Debian.gz # 1.1.2+dfsg-6+deb7u18
OK: virsh
OK: suspend/resume
OK: VNC