qemu: cve-2013-2016

Related Vulnerabilities: cve-2013-2016   CVE-2013-2016  

Debian Bug report logs - #710822
qemu: cve-2013-2016

version graph

Reported by: Michael Gilbert <mgilbert@debian.org>

Date: Sun, 2 Jun 2013 18:57:02 UTC

Severity: minor

Tags: security

Found in version qemu/1.3.0+dfsg-1~exp1

Fixed in version qemu/1.5.0+dfsg-1

Done: <mjt@tls.msk.ru>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#710822; Package qemu. (Sun, 02 Jun 2013 18:57:06 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
New Bug report received and forwarded. Copy sent to Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Sun, 02 Jun 2013 18:57:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: qemu: cve-2013-2016
Date: Sun, 2 Jun 2013 14:53:18 -0400
Package: qemu
Severity: serious
version: 1.5.0+dfsg-1
Tags: security

Hi,
An out-of-bounds issue in virtio was published for qemu:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016

I've checked squeeze and wheezy (both qemu and qemu-kvm).  They are
both not affected.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2016
    http://security-tracker.debian.org/tracker/CVE-2013-2016
Please adjust the affected versions in the BTS as needed.



Information forwarded to debian-bugs-dist@lists.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#710822; Package qemu. (Sun, 02 Jun 2013 19:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Tokarev <mjt@tls.msk.ru>:
Extra info received and forwarded to list. Copy sent to Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Sun, 02 Jun 2013 19:57:04 GMT) (full text, mbox, link).


Message #10 received at 710822@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: Michael Gilbert <mgilbert@debian.org>, 710822@bugs.debian.org
Subject: Re: Bug#710822: qemu: cve-2013-2016
Date: Sun, 02 Jun 2013 23:54:05 +0400
Control: severity -1 minor

02.06.2013 22:53, Michael Gilbert wrote:
> Package: qemu
> Severity: serious
> version: 1.5.0+dfsg-1
> Tags: security
> 
> Hi,
> An out-of-bounds issue in virtio was published for qemu:
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016

Yes, that's the case.  However, the issue is so small, --
they wern't sure it is worth assigning a CVE# for it.
I even forgot to include the fix for it to the latest
1.5.0-3 release.

Setting severity as that.

> I've checked squeeze and wheezy (both qemu and qemu-kvm).  They are
> both not affected.

Thank you for that!

> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

Yes, sure.  Thank you for the bugreport and the diagnostics!

/mjt



Severity set to 'minor' from 'serious' Request was from Michael Tokarev <mjt@tls.msk.ru> to 710822-submit@bugs.debian.org. (Sun, 02 Jun 2013 19:57:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#710822; Package qemu. (Wed, 05 Jun 2013 17:15:08 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Tokarev <mjt@tls.msk.ru>:
Extra info received and forwarded to list. Copy sent to Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Wed, 05 Jun 2013 17:15:08 GMT) (full text, mbox, link).


Message #17 received at 710822@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: Michael Gilbert <mgilbert@debian.org>, 710822@bugs.debian.org
Subject: Re: Bug#710822: qemu: cve-2013-2016
Date: Wed, 05 Jun 2013 21:12:37 +0400
02.06.2013 22:53, Michael Gilbert wrote:
> Package: qemu
> Severity: serious
> version: 1.5.0+dfsg-1
> Tags: security
> 
> Hi,
> An out-of-bounds issue in virtio was published for qemu:
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016

Hmm.  Now I'm really confused.

Upstream version 1.5.0 includes the fix for this issue, so
filing the bug against 1.5.0+dfsg-1 package is kind of wrong.
The fix is commit 5f5a1318653c08e435cfa52f60b6a712815b659d
which was applied past 1.5.0~rc0.

Yes, the experimental version of qemu, based on 1.5.0~rc0,
is buggy, but do we really care about it, especially since
current version is already fixed?

> I've checked squeeze and wheezy (both qemu and qemu-kvm).  They are
> both not affected.

To me it looks like no debian version of qemu is affected.

Thanks!

/mjt



No longer marked as found in versions qemu/1.5.0+dfsg-1. Request was from mjt@tls.msk.ru (Michael Tokarev) to control@bugs.debian.org. (Mon, 10 Jun 2013 07:12:05 GMT) (full text, mbox, link).


Marked as found in versions qemu/1.3.0+dfsg-1~exp1. Request was from mjt@tls.msk.ru (Michael Tokarev) to control@bugs.debian.org. (Mon, 10 Jun 2013 07:12:06 GMT) (full text, mbox, link).


Marked as fixed in versions qemu/1.5.0+dfsg-1. Request was from mjt@tls.msk.ru (Michael Tokarev) to control@bugs.debian.org. (Mon, 10 Jun 2013 07:12:07 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#710822; Package qemu. (Sun, 16 Jun 2013 19:33:04 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Sun, 16 Jun 2013 19:33:04 GMT) (full text, mbox, link).


Message #28 received at 710822@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: 710822@bugs.debian.org
Subject: Re: Bug#710822: qemu: cve-2013-2016
Date: Sun, 16 Jun 2013 15:29:17 -0400
On Wed, Jun 5, 2013 at 1:12 PM, Michael Tokarev wrote:
> 02.06.2013 22:53, Michael Gilbert wrote:
>> Package: qemu
>> Severity: serious
>> version: 1.5.0+dfsg-1
>> Tags: security
>>
>> Hi,
>> An out-of-bounds issue in virtio was published for qemu:
>> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016
>
> Hmm.  Now I'm really confused.
>
> Upstream version 1.5.0 includes the fix for this issue, so
> filing the bug against 1.5.0+dfsg-1 package is kind of wrong.
> The fix is commit 5f5a1318653c08e435cfa52f60b6a712815b659d
> which was applied past 1.5.0~rc0.

Is that a complete fix?  The suggested patch in the redhat bug [0]
also adds checks to virtio-pci.c, which is what I had used for
reference when checking whether this was fixed or not, and that is not
applied in the debian package yet.

Best wishes,
Mike

[0] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016



Information forwarded to debian-bugs-dist@lists.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#710822; Package qemu. (Sat, 29 Jun 2013 19:48:04 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Tokarev <mjt@tls.msk.ru>:
Extra info received and forwarded to list. Copy sent to Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Sat, 29 Jun 2013 19:48:04 GMT) (full text, mbox, link).


Message #33 received at 710822@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: Michael Gilbert <mgilbert@debian.org>, 710822@bugs.debian.org
Subject: Re: Bug#710822: qemu: cve-2013-2016
Date: Sat, 29 Jun 2013 23:45:24 +0400
Please excuse me for this really long delay with the answer.

16.06.2013 23:29, Michael Gilbert wrote:
> On Wed, Jun 5, 2013 at 1:12 PM, Michael Tokarev wrote:
>> 02.06.2013 22:53, Michael Gilbert wrote:
>>> Package: qemu
>>> Severity: serious
>>> version: 1.5.0+dfsg-1
>>> Tags: security
>>>
>>> Hi,
>>> An out-of-bounds issue in virtio was published for qemu:
>>> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016
>>
>> Hmm.  Now I'm really confused.
>>
>> Upstream version 1.5.0 includes the fix for this issue, so
>> filing the bug against 1.5.0+dfsg-1 package is kind of wrong.
>> The fix is commit 5f5a1318653c08e435cfa52f60b6a712815b659d
>> which was applied past 1.5.0~rc0.
> 
> Is that a complete fix?  The suggested patch in the redhat bug [0]
> also adds checks to virtio-pci.c, which is what I had used for
> reference when checking whether this was fixed or not, and that is not
> applied in the debian package yet.

The fix referred to from that redhat bugreport (which is here --
https://lists.gnu.org/archive/html/qemu-devel/2013-04/msg05254.html
or http://thread.gmane.org/gmane.comp.emulators.qemu/208677 )
was a suggested patch.  After which some discussion emerged (see
the thread on gmane), and another, V2 version of the same patch were
sent, which is here -- http://patchwork.ozlabs.org/patch/241991/ or
http://thread.gmane.org/gmane.comp.emulators.qemu/210292 -- which has
been applied as 5f5a1318653c08e, which is included in 1.5.0-rc1 and up.

Thanks,

/mjt

> [0] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016





Marked Bug as done Request was from <mjt@tls.msk.ru> to control@bugs.debian.org. (Wed, 02 Oct 2013 13:33:04 GMT) (full text, mbox, link).


Notification sent to Michael Gilbert <mgilbert@debian.org>:
Bug acknowledged by developer. (Wed, 02 Oct 2013 13:33:05 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 31 Oct 2013 07:27:52 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:17:32 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.