CVE-2014-9718

NameCVE-2014-9718
DescriptionThe (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3259-1
NVD severitymedium (attack range: local)
Debian Bugs781250

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)wheezy1.1.2+dfsg-6a+deb7u12vulnerable
wheezy (security)1.1.2+dfsg-6+deb7u23vulnerable
jessie (security), jessie1:2.1+dfsg-12+deb8u6fixed
stretch1:2.8+dfsg-6fixed
stretch (security)1:2.8+dfsg-6+deb9u2fixed
buster1:2.8+dfsg-7fixed
sid1:2.10.0+dfsg-1fixed
qemu-kvm (PTS)wheezy1.1.2+dfsg-6+deb7u12vulnerable
wheezy (security)1.1.2+dfsg-6+deb7u23vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusource(unstable)1:2.3+dfsg-1unimportant781250
qemusourcejessie1:2.1+dfsg-12mediumDSA-3259-1
qemu-kvmsource(unstable)(unfixed)unimportant

Notes

http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8 (v2.2.0-rc2)
http://www.openwall.com/lists/oss-security/2015/03/24/4
Per maintainer not a security issue:
Qemu either leaks memory or loops infinitely. Memory leakage can be easily
mitigated using some kind of resource limits in security-sensitive environments,
and looping can trivially be done inside the virtual machine just fine, achieving
the same effect

Search for package or bug name: Reporting problems