Bug 1812659 (CVE-2019-15034)

Summary: CVE-2019-15034 qemu: hw/display/bochs-display.c does not ensure a sufficient PCI config space allocation leading to a buffer overflow involving the PCIe extended config space
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ailan, amit, areis, berrange, cfergeau, dbecker, drjones, dwmw2, imammedo, itamar, jen, jferlan, jforbes, jjoyce, jmaloy, jschluet, kbasil, knoel, lhh, lpeer, m.a.young, mburns, mkenneth, mrezanin, mst, pbonzini, ribarry, rjones, robinlee.sysu, sclewis, slinaber, virt-maint, virt-maint, vkuznets, xen-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: qemu 4.1.0 Doc Type: If docs needed, set a value
Doc Text:
A buffer overflow flaw was found in the way the Bochs display driver of QEMU handled the PCIe extended configuration space when the device is connected to a PCIe bus. Accessing the PCIe extended config space could overflow the conventional PCI config space buffer due to limited memory allocation. As the PCIe config space is guest writeable, this flaw allows a local attacker to gain access and potentially execute arbitrary code on the host with the privileges of the QEMU process.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-02 22:31:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1810201    

Description Guilherme de Almeida Suckevicz 2020-03-11 19:06:49 UTC
hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.

Reference:
https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01959.html

Comment 2 Mauro Matteo Cascella 2020-03-25 16:08:37 UTC
Mitigation:

Use `-device bochs-display` as conventional PCI device only.

Comment 3 Nick Tait 2020-04-02 16:33:15 UTC
Statement:

This flaw does not affect the module stream`virt:8.1/qemu-kvm` as shipped with RHEL Advanced Virtualization, as it already includes the patch.
Several other packages are unaffected because they do not include PCIe support:
* `kvm` and `xen` as shipped with Red Hat Enterprise Linux 5
* `qemu-kvm` as shipped with Red Hat Enterprise Linux 6 and 7
* `qemu-kvm-rhev` as shipped with Red Hat Enterprise Linux 7
* `virt:rhel/qemu-kvm` as shipped with Red Hat Enterprise Linux 8
* `qemu-kvm-rhev` as shipped with Red Hat OpenStack Platform 10 and 13

Comment 4 Product Security DevOps Team 2020-04-02 22:31:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-15034