CVE-2013-1922 -- qemu-nbd block format auto-detection vulnerability

Related Vulnerabilities: CVE-2013-1922   CVE-2008-2004  

Debian Bug report logs - #705544
CVE-2013-1922 -- qemu-nbd block format auto-detection vulnerability

version graph

Reported by: Michael Tokarev <mjt@tls.msk.ru>

Date: Tue, 16 Apr 2013 14:33:02 UTC

Severity: normal

Tags: patch, security, upstream

Found in version qemu/1.1.2+dfsg-1

Fixed in version 1.5.0~rc0+dfsg-1

Done: Michael Tokarev <mjt@tls.msk.ru>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#705544; Package qemu-utils. (Tue, 16 Apr 2013 14:33:06 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Tokarev <mjt@tls.msk.ru>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Tue, 16 Apr 2013 14:33:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2013-1922 -- qemu-nbd block format auto-detection vulnerability
Date: Tue, 16 Apr 2013 18:28:33 +0400
Package: qemu-utils
Version: 1.1.2+dfsg-1
Severity: normal
Tags: security patch upstream

qemu-nbd utility does not has an option to specify format of the block
image it serves, so it is possible by a guest (user of nbd device) to
write data to it the way so it looks like some format known to qemu-nbd,
and the next time qemu-nbd is restarted with the same image, it will be
tricked to interpret (probably especially crafted) that format.

It is very similar to old vulnerability in qemu itself, CVE-2008-2004.

https://bugzilla.redhat.com/show_bug.cgi?id=923219
http://www.openwall.com/lists/oss-security/2013/04/15/3

The upstream fix -- https://bugzilla.redhat.com/attachment.cgi?id=712650&action=diff --
merely adds an option to qemu-nbd that allows to specify format of the
image explicitly instead of always relying on guessing.

I don't think this is a serious issue, for several reasons:

 o qemu-nbd isn't usually used in production where there's a chance to
   hit a malicious guest. Instead, it is used mostly for testing or for
   access to the guest image from host, for administrative purposes, in
   both cases the issue isn't serious.

 o even when modified to understand a new option, all relevant usages should
   be modified as well, to utilize the new option.

However, it's still nice to fix it in debian package.  I'm not sure yet
whenever we should fix it for wheezy or not.

Thanks,

/mjt



Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Thu, 09 May 2013 19:15:08 GMT) (full text, mbox, link).


Notification sent to Michael Tokarev <mjt@tls.msk.ru>:
Bug acknowledged by developer. (Thu, 09 May 2013 19:15:08 GMT) (full text, mbox, link).


Message #10 received at 705544-done@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 705544-done@bugs.debian.org
Subject: 705544 fixed in 1.5
Date: Thu, 09 May 2013 23:13:56 +0400
Version: 1.5.0~rc0+dfsg-1

The qemu-nbd option mentioned in the bugreport were added for 1.5.
This still does not mean that qemu-nbd magically becomes safe and
bug-free, instead, all usages of it now should include the new
option (-f for `format') to actually make it safe.

/mjt



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 05 Dec 2013 07:32:58 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:21:19 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.