Bug 2208325 - QEMU: ui/cursor: make width/height unsigned 16-bit integer
Summary: QEMU: ui/cursor: make width/height unsigned 16-bit integer
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2208328 2208327 2208330 2208331
Blocks: 2208329
TreeView+ depends on / blocked
 
Reported: 2023-05-18 15:28 UTC by Mauro Matteo Cascella
Modified: 2024-02-13 16:54 UTC (History)
18 users (show)

Fixed In Version: qemu-kvm 8.1.0
Clone Of:
Environment:
Last Closed: 2023-05-24 08:44:23 UTC
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2023-05-18 15:28:26 UTC
The cursor_alloc() function still accepts a signed integer for both the cursor width and height. A specially crafted negative value could make datasize wrap around and cause the next allocation to be 0, potentially leading to a heap buffer overflow.

Proposed upstream patch:
https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg01907.html

Original CVE-2021-4206:
https://bugzilla.redhat.com/show_bug.cgi?id=2036998

*** EDIT ***
CVE-2023-1601 was originally allocated because of an alleged incomplete fix for CVE-2021-4206. The CVE was subsequently rejected as the flaw was not confirmed. See https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg05546.html.

Comment 1 Mauro Matteo Cascella 2023-05-18 15:28:55 UTC
Created qemu tracking bugs for this issue:

Affects: epel-all [bug 2208328]
Affects: fedora-all [bug 2208327]

Comment 3 Salvatore Bonaccorso 2023-05-23 10:19:40 UTC
Hi

Should this CVE be rejected? According to https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg05546.html there seems to be no code path which can trigger the overflow.

Regards,
Salvatore

Comment 4 Mauro Matteo Cascella 2023-05-23 15:00:44 UTC
Hi, yes I'm going to reject this CVE. Thanks.

Comment 5 Mauro Matteo Cascella 2023-05-24 09:02:54 UTC
Updated patch:
https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg05867.html

Comment 6 Mauro Matteo Cascella 2023-07-17 13:19:37 UTC
Upstream commit:
https://gitlab.com/qemu-project/qemu/-/commit/4c93ce54e7114aae33100d2ee4f2b36e451a1d06


Note You need to log in before you can comment on or make changes to this bug.