Your message dated Sat, 02 Jul 2011 13:59:14 +0000
with message-id <e1qd0j4-00074n...@franck.debian.org>
and subject line Bug#631975: fixed in qemu-kvm 0.12.5+dfsg-5+squeeze4
has caused the Debian Bug report #631975,
regarding OOB memory access caused by negative vq notifies (CVE-2011-2512)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
631975: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631975
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: qemu-kvm
Version: 0.12.5+dfsg-5+squeeze3
Severity: grave
Tags: upstream security squeeze sid

The virtio_queue_notify() function checks that the virtqueue number is
less than the maximum number of virtqueues.  A signed comparison is used
but the virtqueue number could be negative if a buggy or malicious guest
is run.  This results in memory accesses outside of the virtqueue array.

This can be triggered by malicious guest - unprivileged guest user can
either crash the qemu process or, possible, gain extra privileges on
the host.

Additional information:
http://patchwork.ozlabs.org/patch/94604/ (upstream patch)
https://bugzilla.redhat.com/show_bug.cgi?id=717399

The problem affects both sqeeze and sid versions.  It is present in
lenny too, but that one is hopeless (we should provide fixes for
lenny backports instead).



--- End Message ---
--- Begin Message ---
Source: qemu-kvm
Source-Version: 0.12.5+dfsg-5+squeeze4

We believe that the bug you reported is fixed in the latest version of
qemu-kvm, which is due to be installed in the Debian FTP archive:

kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
  to main/q/qemu-kvm/kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
qemu-kvm-dbg_0.12.5+dfsg-5+squeeze4_amd64.deb
  to main/q/qemu-kvm/qemu-kvm-dbg_0.12.5+dfsg-5+squeeze4_amd64.deb
qemu-kvm_0.12.5+dfsg-5+squeeze4.diff.gz
  to main/q/qemu-kvm/qemu-kvm_0.12.5+dfsg-5+squeeze4.diff.gz
qemu-kvm_0.12.5+dfsg-5+squeeze4.dsc
  to main/q/qemu-kvm/qemu-kvm_0.12.5+dfsg-5+squeeze4.dsc
qemu-kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
  to main/q/qemu-kvm/qemu-kvm_0.12.5+dfsg-5+squeeze4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 631...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <m...@tls.msk.ru> (supplier of updated qemu-kvm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 29 Jun 2011 00:44:36 +0400
Source: qemu-kvm
Binary: qemu-kvm qemu-kvm-dbg kvm
Architecture: source amd64
Version: 0.12.5+dfsg-5+squeeze4
Distribution: stable-security
Urgency: high
Maintainer: Jan Lübbe <jlue...@debian.org>
Changed-By: Michael Tokarev <m...@tls.msk.ru>
Description: 
 kvm        - dummy transitional package from kvm to qemu-kvm
 qemu-kvm   - Full virtualization on x86 hardware
 qemu-kvm-dbg - Debugging info for qemu-kvm
Closes: 631975
Changes: 
 qemu-kvm (0.12.5+dfsg-5+squeeze4) stable-security; urgency=high
 .
   * virtio: guard against negative vq notifies -- fixes a guest-triggerable
     bug in virtio implementation (CVE-2011-2512) (Closes: #631975)
Checksums-Sha1: 
 cd52234a17a7d0266cb943abbae1c92cfd34fffa 1696 
qemu-kvm_0.12.5+dfsg-5+squeeze4.dsc
 03fdf8cab0c8010b93bf1466f4e9003eb54ab7d4 310355 
qemu-kvm_0.12.5+dfsg-5+squeeze4.diff.gz
 c790ad9d44f23c7105a91017828ee455c8719348 1613072 
qemu-kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
 5d7b0cf3b49e91f1192f45971d584dc3d713778b 2819218 
qemu-kvm-dbg_0.12.5+dfsg-5+squeeze4_amd64.deb
 e61cf96bbe39678a1f88271965dd577ba58c9eb7 13240 
kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
Checksums-Sha256: 
 7cc418f9237598d181555fed9c95f9ca61fc3279c58241cacbb263bcae02a444 1696 
qemu-kvm_0.12.5+dfsg-5+squeeze4.dsc
 bd6783731b5cea85956b14d18e2586a278dfb52cd58e61fe6d5a1bbf555dfbe7 310355 
qemu-kvm_0.12.5+dfsg-5+squeeze4.diff.gz
 3fa2c2a2a55216d07458e8346a6551f23b76974331e171b75795e2a30cee7f26 1613072 
qemu-kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
 cf533fdb164c84e7867c4e87aa2fcabb95e99cb56e6924342772613ec3ea3aaa 2819218 
qemu-kvm-dbg_0.12.5+dfsg-5+squeeze4_amd64.deb
 320ca0eb87fa51c510c989720f89d55d05998094e5487156d463cb1e40e658c4 13240 
kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
Files: 
 374d6a8f183a435fe71a8a9df7b65894 1696 misc optional 
qemu-kvm_0.12.5+dfsg-5+squeeze4.dsc
 9a46867c5a5224e20663b2432aabcfe0 310355 misc optional 
qemu-kvm_0.12.5+dfsg-5+squeeze4.diff.gz
 1c75f68dd0eeacd513c68ad28133f091 1613072 misc optional 
qemu-kvm_0.12.5+dfsg-5+squeeze4_amd64.deb
 266242ac3d7c2bab21efd7449caa710a 2819218 debug extra 
qemu-kvm-dbg_0.12.5+dfsg-5+squeeze4_amd64.deb
 c68703d71b408bdf6b1e0056b92e5e0c 13240 oldlibs extra 
kvm_0.12.5+dfsg-5+squeeze4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4NjkIACgkQioOL5NhIDy54nwCg3GFgIbFjEe2XZ4rqeNqXIW40
Kn0An1zzDsfTDsRK+YJbeQrtv5scE7vR
=g1wB
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to