qemu: CVE-2017-10806: usb-redirect: stack buffer overflow in debug logging

Related Vulnerabilities: CVE-2017-10806   CVE-2017-9524   CVE-2017-11434   CVE-2017-11334   CVE-2017-10911   CVE-2017-9375  

Debian Bug report logs - #867751
qemu: CVE-2017-10806: usb-redirect: stack buffer overflow in debug logging

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 9 Jul 2017 08:18:10 UTC

Severity: minor

Tags: security, upstream

Found in version qemu/1:2.1+dfsg-11

Fixed in versions qemu/1:2.8+dfsg-7, 1:2.8+dfsg-7, qemu/1:2.8+dfsg-6+deb9u2

Done: Michael Tokarev <mjt@tls.msk.ru>

Bug is archived. No further changes may be made.

Forwarded to https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#867751; Package src:qemu. (Sun, 09 Jul 2017 08:18:12 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Sun, 09 Jul 2017 08:18:12 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: qemu: CVE-2017-10806: usb-redirect: stack buffer overflow in debug logging
Date: Sun, 09 Jul 2017 10:17:07 +0200
Source: qemu
Version: 1:2.1+dfsg-11
Severity: minor
Tags: security upstream
Forwarded: https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html

Hi,

the following vulnerability was published for qemu.

CVE-2017-10806[0]:
usb-redirect: stack buffer overflow in debug logging

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-10806
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10806
[1] https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html

Regards,
Salvatore



Added tag(s) pending. Request was from <mjt@tls.msk.ru> to control@bugs.debian.org. (Mon, 31 Jul 2017 11:36:03 GMT) (full text, mbox, link).


Marked as fixed in versions qemu/1:2.8+dfsg-7. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 05 Aug 2017 14:00:07 GMT) (full text, mbox, link).


Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Mon, 25 Sep 2017 07:12:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Mon, 25 Sep 2017 07:12:05 GMT) (full text, mbox, link).


Message #14 received at 867751-done@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 867751-done@bugs.debian.org
Subject: Re: Bug#867751: qemu: CVE-2017-10806: usb-redirect: stack buffer overflow in debug logging
Date: Mon, 25 Sep 2017 10:02:58 +0300
Version: 1:2.8+dfsg-7

This has been fixed in 2.8+dfsg-7.



Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Thu, 28 Sep 2017 05:51:13 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 28 Sep 2017 05:51:13 GMT) (full text, mbox, link).


Message #19 received at 867751-close@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 867751-close@bugs.debian.org
Subject: Bug#867751: fixed in qemu 1:2.8+dfsg-6+deb9u2
Date: Thu, 28 Sep 2017 05:47:12 +0000
Source: qemu
Source-Version: 1:2.8+dfsg-6+deb9u2

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 867751@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <mjt@tls.msk.ru> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 02 Aug 2017 16:57:34 +0300
Source: qemu
Binary: qemu qemu-system qemu-block-extra qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm
Architecture: source
Version: 1:2.8+dfsg-6+deb9u2
Distribution: stretch-security
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
 qemu       - fast processor emulator
 qemu-block-extra - extra block backend modules for qemu-system and qemu-utils
 qemu-guest-agent - Guest-side qemu-system agent
 qemu-kvm   - QEMU Full virtualization on x86 hardware
 qemu-system - QEMU full system emulation binaries
 qemu-system-arm - QEMU full system emulation binaries (arm)
 qemu-system-common - QEMU full system emulation binaries (common files)
 qemu-system-mips - QEMU full system emulation binaries (mips)
 qemu-system-misc - QEMU full system emulation binaries (miscellaneous)
 qemu-system-ppc - QEMU full system emulation binaries (ppc)
 qemu-system-sparc - QEMU full system emulation binaries (sparc)
 qemu-system-x86 - QEMU full system emulation binaries (x86)
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 865755 867751 869171 869173 869945
Changes:
 qemu (1:2.8+dfsg-6+deb9u2) stretch-security; urgency=high
 .
   * actually apply the nbd server patches, not only include in debian/patches/
     Really closes: #865755, CVE-2017-9524
   * slirp-check-len-against-dhcp-options-array-end-CVE-2017-11434.patch
     Closes: #869171, CVE-2017-11434
   * exec-use-qemu_ram_ptr_length-to-access-guest-ram-CVE-2017-11334.patch
     Closes: #869173, CVE-2017-11334
   * usb-redir-fix-stack-overflow-in-usbredir_log_data-CVE-2017-10806.patch
     Closes: #867751, CVE-2017-10806
   * add reference to #869706 to
     xen-disk-don-t-leak-stack-data-via-response-ring-CVE-2017-10911.patch
   * disable xhci recursive calls fix for now, as it causes instant crash
     (xhci-guard-xhci_kick_epctx-against-recursive-calls-CVE-2017-9375.patch)
     Reopens: #864219, CVE-2017-9375
     Closes: #869945
Checksums-Sha1:
 1a2314a55308cbd977d6255a00d886c424155c51 5579 qemu_2.8+dfsg-6+deb9u2.dsc
 e237d980c29f2e0bbd9bdfd81d2c2ecfa8bc84c7 125676 qemu_2.8+dfsg-6+deb9u2.debian.tar.xz
 2552189938eb0e241d8f006b3dd5947b7e047272 10780 qemu_2.8+dfsg-6+deb9u2_source.buildinfo
Checksums-Sha256:
 e831a68fee079d0e731dcc259b77067b04e6f0ad13903d4fc7eebdb86b5e27f7 5579 qemu_2.8+dfsg-6+deb9u2.dsc
 62e98ed5db40ba75d10cf589fedbf1f47b0d6e27e5457808a03a48a124e579de 125676 qemu_2.8+dfsg-6+deb9u2.debian.tar.xz
 3f9cf6d7be6fe32b6bbf5d641b9c871d23a104b1bb5e55d256c1f63312d8f6b6 10780 qemu_2.8+dfsg-6+deb9u2_source.buildinfo
Files:
 205e0d50a023ddf4a5505991681861c3 5579 otherosfs optional qemu_2.8+dfsg-6+deb9u2.dsc
 48289e903387296142e73f37525a02be 125676 otherosfs optional qemu_2.8+dfsg-6+deb9u2.debian.tar.xz
 76891081c5865b92a5912d58f0fcb6ea 10780 otherosfs optional qemu_2.8+dfsg-6+deb9u2_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQFDBAEBCAAtFiEEe3O61ovnosKJMUsicBtPaxppPlkFAlmB4U4PHG1qdEB0bHMu
bXNrLnJ1AAoJEHAbT2saaT5ZDf0H/0zW8YtkXgYy+V9emiib1j2J91IHF+YtYrwz
Ix89CbkNkCjl7sd1YMiSEb1R2iTR2A4LXE3B6UUmNJ/LWCIVFzJXQz1SzPzqCOeh
vz5lAIPhsuYhzw6/jOMiNQLn7iS8TNkyBdWqTeaiLYevDePTyvnPLTnhjXrswINK
flCWIfi6esjnk9Rzn87BwVm7k/DclVJt3A+JlrGAkq7vnHCPUnjcUkAGdhl0LMop
T/SgJ+Kj0IefuLRvSEQOd287cT+INEK1mQf0uuOLoxy4gTQNkKNAWhb6fUwes/z8
YNWkxwWwVQ5ypfitM24+Lq3s+BNiNXdpktO2xDtfghi0OthoAnM=
=nmt+
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 10 Nov 2017 07:29:09 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:42:44 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.