Debian Bug report logs -
#611134
CVE-2011-0011 qemu-kvm: Setting VNC password to empty string silently disables all authentication
Reported by: Moritz Muehlenhoff <jmm@debian.org>
Date: Tue, 25 Jan 2011 21:27:01 UTC
Severity: grave
Tags: security, squeeze-ignore
Fixed in versions qemu-kvm/0.12.5+dfsg-5+squeeze1, 0.14.0+dfsg-1~tls
Done: Michael Tokarev <mjt@tls.msk.ru>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Tue, 25 Jan 2011 21:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Moritz Muehlenhoff <jmm@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Jan Lübbe <jluebbe@debian.org>.
(Tue, 25 Jan 2011 21:27:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: kvm
Severity: grave
Tags: security
Please see the following entry in the Red Hat bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0011
The impact is not entirely obvious to me? Do I understand it
correctly that a malicious application accessing a KVM
instance could lock out other apps to this virtual machine?
Do you think this needs to be fixed for Squeeze or in a
point update?
Cheers,
Moritz
-- System Information:
Debian Release: 6.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Wed, 26 Jan 2011 06:00:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Tokarev <mjt@tls.msk.ru>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Wed, 26 Jan 2011 06:00:03 GMT) (full text, mbox, link).
Message #10 received at 611134@bugs.debian.org (full text, mbox, reply):
26.01.2011 00:25, Moritz Muehlenhoff wrote:
> Package: kvm
> Severity: grave
> Tags: security
>
> Please see the following entry in the Red Hat bugzilla:
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0011
Yes, I've seen this even before CVE ID were assigned.
> The impact is not entirely obvious to me? Do I understand it
> correctly that a malicious application accessing a KVM
> instance could lock out other apps to this virtual machine?
This is completely wrong understanding.
First of all, only one instance is affected.
Second, this is an intended behavour. Emty vnc password
meant to be no authentication, not a lockdown. When you
start it without specifying a password it lets everyone
in.
There was a bug in previous versions of qemu which is now
fixed by the commit mentioned in that RH bugreport. A bug
which resulted in inability to change vnc to "no auth" mode
at runtime if a password has been specified.
The implication is this: if there was an application that
relied on the wrong behavour, "thinking" that changing VNC
password at runtime to an empty string means a lockdown,
that combination is now broken, since instead of a lockdown
we're getting wide-open access. But I'm not aware of any
application like that.
> Do you think this needs to be fixed for Squeeze or in a
> point update?
I think this does not need to be "fixed" at all. Maybe a
wishlist bug requesting a way to explicitly enable/disable
vnc at runtime, or - provided an application that relies
on the buggy behavour is found - a fix for that application,
but definitely not like RH has put it. I think.
Thanks!
/mjt
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Wed, 26 Jan 2011 08:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Julien Cristau <jcristau@debian.org>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Wed, 26 Jan 2011 08:27:03 GMT) (full text, mbox, link).
Message #15 received at 611134@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Wed, Jan 26, 2011 at 08:56:06 +0300, Michael Tokarev wrote:
> Second, this is an intended behavour. Emty vnc password
> meant to be no authentication, not a lockdown. When you
> start it without specifying a password it lets everyone
> in.
>
Intended by whom?
Cheers,
Julien
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Wed, 26 Jan 2011 10:12:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Tokarev <mjt@tls.msk.ru>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Wed, 26 Jan 2011 10:12:12 GMT) (full text, mbox, link).
Message #20 received at 611134@bugs.debian.org (full text, mbox, reply):
On 26.01.2011 11:25, Julien Cristau wrote:
> On Wed, Jan 26, 2011 at 08:56:06 +0300, Michael Tokarev wrote:
>
>> Second, this is an intended behavour. Emty vnc password
>> meant to be no authentication, not a lockdown. When you
>> start it without specifying a password it lets everyone
>> in.
>>
> Intended by whom?
Well, that's a good question. From how qemu works that's
quite logical thing to expect, to me anyway. Empty password
means empty password, ie, wide access instead of no access.
IMHO anyway.
/mjt
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Thu, 27 Jan 2011 22:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Moritz Mühlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Thu, 27 Jan 2011 22:03:03 GMT) (full text, mbox, link).
Message #25 received at 611134@bugs.debian.org (full text, mbox, reply):
On Wed, Jan 26, 2011 at 08:56:06AM +0300, Michael Tokarev wrote:
> 26.01.2011 00:25, Moritz Muehlenhoff wrote:
> > Package: kvm
> > Severity: grave
> > Tags: security
> >
> > Please see the following entry in the Red Hat bugzilla:
> > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0011
>
> Yes, I've seen this even before CVE ID were assigned.
>
> > The impact is not entirely obvious to me? Do I understand it
> > correctly that a malicious application accessing a KVM
> > instance could lock out other apps to this virtual machine?
>
> This is completely wrong understanding.
>
> First of all, only one instance is affected.
>
> Second, this is an intended behavour. Emty vnc password
> meant to be no authentication, not a lockdown. When you
> start it without specifying a password it lets everyone
> in.
>
> There was a bug in previous versions of qemu which is now
> fixed by the commit mentioned in that RH bugreport. A bug
> which resulted in inability to change vnc to "no auth" mode
> at runtime if a password has been specified.
>
> The implication is this: if there was an application that
> relied on the wrong behavour, "thinking" that changing VNC
> password at runtime to an empty string means a lockdown,
> that combination is now broken, since instead of a lockdown
> we're getting wide-open access. But I'm not aware of any
> application like that.
Thanks for the verbose explanation. I've updated the Debian
Security Tracker.
While we're at it; could you please also look into
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?
Is this something that still needs to be fixed for Squeeze?
Cheers,
Moritz
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Sat, 29 Jan 2011 16:03:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Julien Cristau <jcristau@debian.org>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Sat, 29 Jan 2011 16:03:07 GMT) (full text, mbox, link).
Message #30 received at 611134@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
user release.debian.org@packages.debian.org
usertag 611134 squeeze-can-defer
tag 611134 squeeze-ignore
kthxbye
On Tue, Jan 25, 2011 at 22:25:27 +0100, Moritz Muehlenhoff wrote:
> Package: kvm
> Severity: grave
> Tags: security
>
> Please see the following entry in the Red Hat bugzilla:
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0011
>
Tagging as not a blocker for squeeze.
Cheers,
Julien
[signature.asc (application/pgp-signature, inline)]
Added tag(s) squeeze-ignore.
Request was from Julien Cristau <jcristau@debian.org>
to control@bugs.debian.org.
(Sat, 29 Jan 2011 16:03:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Fri, 04 Feb 2011 10:39:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Tokarev <mjt@tls.msk.ru>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Fri, 04 Feb 2011 10:39:07 GMT) (full text, mbox, link).
Message #37 received at 611134@bugs.debian.org (full text, mbox, reply):
Please excuse me for late reply - I missed your email initially somehow.
28.01.2011 00:59, Moritz Mühlenhoff wrote:
[]
> Thanks for the verbose explanation. I've updated the Debian
> Security Tracker.
>
> While we're at it; could you please also look into
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?
That's a problem in the (host) kernel.
> Is this something that still needs to be fixed for Squeeze?
It is fixed in 2.6.32.27, by the following patch:
------------------
From 85dedd445698c5bbd096289cfcc6034f74941815 Mon Sep 17 00:00:00 2001
From: Gleb Natapov <gleb@redhat.com>
Date: Wed, 10 Nov 2010 12:08:12 +0200
Subject: KVM: VMX: fix vmx null pointer dereference on debug register access
There is a bug in KVM that can be used to crash a host on Intel
machines. If emulator is tricked into emulating mov to/from DR instruction
it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr
are not initialized. Recently this is not exploitable from guest
userspace, but malicious guest kernel can trigger it easily.
CVE-2010-0435
On upstream bug was fixed differently around 2.6.34.
------------------
As far as I can see, 2.6.32.27 patch is included in current debian
kernels. So no action appears to be necessary.
Thanks!
/mjt
Information forwarded
to debian-bugs-dist@lists.debian.org, Jan Lübbe <jluebbe@debian.org>:
Bug#611134; Package kvm.
(Fri, 04 Feb 2011 10:39:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Jan Lübbe <jluebbe@debian.org>.
(Fri, 04 Feb 2011 10:39:09 GMT) (full text, mbox, link).
Message #42 received at 611134@bugs.debian.org (full text, mbox, reply):
On Fri, Feb 04, 2011 at 01:35:11PM +0300, Michael Tokarev wrote:
> Please excuse me for late reply - I missed your email initially somehow.
>
> 28.01.2011 00:59, Moritz Mühlenhoff wrote:
> []
> > Thanks for the verbose explanation. I've updated the Debian
> > Security Tracker.
> >
> > While we're at it; could you please also look into
> > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?
>
> That's a problem in the (host) kernel.
>
> > Is this something that still needs to be fixed for Squeeze?
>
> It is fixed in 2.6.32.27, by the following patch:
>
> ------------------
> From 85dedd445698c5bbd096289cfcc6034f74941815 Mon Sep 17 00:00:00 2001
> From: Gleb Natapov <gleb@redhat.com>
> Date: Wed, 10 Nov 2010 12:08:12 +0200
> Subject: KVM: VMX: fix vmx null pointer dereference on debug register access
>
> There is a bug in KVM that can be used to crash a host on Intel
> machines. If emulator is tricked into emulating mov to/from DR instruction
> it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr
> are not initialized. Recently this is not exploitable from guest
> userspace, but malicious guest kernel can trigger it easily.
>
> CVE-2010-0435
>
> On upstream bug was fixed differently around 2.6.34.
> ------------------
>
> As far as I can see, 2.6.32.27 patch is included in current debian
> kernels. So no action appears to be necessary.
Thanks for the feedback, I've updated the Security Tracker.
Cheers,
Moritz
Added tag(s) pending.
Request was from Michael Tokarev <mjt@tls.msk.ru>
to control@bugs.debian.org.
(Tue, 26 Apr 2011 08:33:16 GMT) (full text, mbox, link).
Reply sent
to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility.
(Mon, 02 May 2011 20:12:07 GMT) (full text, mbox, link).
Notification sent
to Moritz Muehlenhoff <jmm@debian.org>:
Bug acknowledged by developer.
(Mon, 02 May 2011 20:12:07 GMT) (full text, mbox, link).
Message #49 received at 611134-close@bugs.debian.org (full text, mbox, reply):
Source: qemu-kvm
Source-Version: 0.12.5+dfsg-5+squeeze1
We believe that the bug you reported is fixed in the latest version of
qemu-kvm, which is due to be installed in the Debian FTP archive:
kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
to main/q/qemu-kvm/kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
qemu-kvm-dbg_0.12.5+dfsg-5+squeeze1_amd64.deb
to main/q/qemu-kvm/qemu-kvm-dbg_0.12.5+dfsg-5+squeeze1_amd64.deb
qemu-kvm_0.12.5+dfsg-5+squeeze1.diff.gz
to main/q/qemu-kvm/qemu-kvm_0.12.5+dfsg-5+squeeze1.diff.gz
qemu-kvm_0.12.5+dfsg-5+squeeze1.dsc
to main/q/qemu-kvm/qemu-kvm_0.12.5+dfsg-5+squeeze1.dsc
qemu-kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
to main/q/qemu-kvm/qemu-kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 611134@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Tokarev <mjt@tls.msk.ru> (supplier of updated qemu-kvm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Tue, 26 Apr 2011 12:04:36 +0400
Source: qemu-kvm
Binary: qemu-kvm qemu-kvm-dbg kvm
Architecture: source amd64
Version: 0.12.5+dfsg-5+squeeze1
Distribution: stable-security
Urgency: high
Maintainer: Jan Lübbe <jluebbe@debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
kvm - dummy transitional package from kvm to qemu-kvm
qemu-kvm - Full virtualization on x86 hardware
qemu-kvm-dbg - Debugging info for qemu-kvm
Closes: 611134 624177
Changes:
qemu-kvm (0.12.5+dfsg-5+squeeze1) stable-security; urgency=high
.
* fix CVE-2011-0011: Setting VNC password to empty string
silently disables all authentication (Closes: #611134)
* fix CVE-2011-1750: virtio-blk: heap buffer overflow caused
by unaligned requests (Closes: #624177)
* urgency is high due to #624177
Checksums-Sha1:
60e865cf028cd22db33017d65e2e446b0dc97392 1696 qemu-kvm_0.12.5+dfsg-5+squeeze1.dsc
565ee0ce6995798b577d23746b1fc4fdbc9e8458 3801867 qemu-kvm_0.12.5+dfsg.orig.tar.gz
67626e00fd3081b6df80fa2d4a8fcdeb42ef52ab 299331 qemu-kvm_0.12.5+dfsg-5+squeeze1.diff.gz
cabca783e1223e1f132354fc7a299004b391ae01 1612670 qemu-kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
1cefb37d4d28ff9d513f0f85df0ac5fa2780b1b9 2817690 qemu-kvm-dbg_0.12.5+dfsg-5+squeeze1_amd64.deb
5d0f41e0ac73db5676c3f153b72c4fcc49bcb3b1 12522 kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
Checksums-Sha256:
b0484bac40d294a099dd1016b436fcabb2689cbdd73b2da688eccef9c1983003 1696 qemu-kvm_0.12.5+dfsg-5+squeeze1.dsc
2f4ff1b7fd30318a19636ed4266a13184c1729b428097763a84ee5b5bf466856 3801867 qemu-kvm_0.12.5+dfsg.orig.tar.gz
203d5a8b34b3f65050053b3915c7ce5f1474383277b440cb81feafaa1ba1da72 299331 qemu-kvm_0.12.5+dfsg-5+squeeze1.diff.gz
f62cb9689d904c3a843794cc1fe8c21947349f7f00fbdc8c6affc910ab190da2 1612670 qemu-kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
fdbe3bab6c18879971915c4dfb2fab5f59a8a2218a64ec25090daf8825349b1b 2817690 qemu-kvm-dbg_0.12.5+dfsg-5+squeeze1_amd64.deb
595a0a3d402cb35195584fa313aa47bb25376760c92c0517703ed6d268b231f1 12522 kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
Files:
85bd61fb21930e014f0790bf51c16862 1696 misc optional qemu-kvm_0.12.5+dfsg-5+squeeze1.dsc
a28c3bf70d0bb298153764e74d1551f0 3801867 misc optional qemu-kvm_0.12.5+dfsg.orig.tar.gz
4aff91f02a90bb3d0a78a0a98d7fe4c6 299331 misc optional qemu-kvm_0.12.5+dfsg-5+squeeze1.diff.gz
ef790ddd5f249fa3818919f1dc661bdb 1612670 misc optional qemu-kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
047e07f2d32a0b108d83f7b494b3d316 2817690 debug extra qemu-kvm-dbg_0.12.5+dfsg-5+squeeze1_amd64.deb
66cf4a055e8bf56b9166270d2390f4c2 12522 oldlibs extra kvm_0.12.5+dfsg-5+squeeze1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk24eRwACgkQXm3vHE4uylr44QCg53EQEUH/VC5F72DzT0NqcL3e
i+MAoKO/7LfNDlqcFh3c1e8Q7WCpxkx0
=08XY
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 26 Jun 2011 07:33:41 GMT) (full text, mbox, link).
Bug unarchived.
Request was from Michael Tokarev <mjt@tls.msk.ru>
to control@bugs.debian.org.
(Sun, 30 Oct 2011 19:21:06 GMT) (full text, mbox, link).
Bug Marked as fixed in versions 1:0.14.0-1.
Request was from Michael Tokarev <mjt@tls.msk.ru>
to control@bugs.debian.org.
(Sun, 30 Oct 2011 19:21:07 GMT) (full text, mbox, link).
Bug Marked as fixed in versions 0.14.0+dfsg-1.
Request was from Michael Tokarev <mjt@tls.msk.ru>
to control@bugs.debian.org.
(Sun, 30 Oct 2011 19:27:06 GMT) (full text, mbox, link).
Bug No longer marked as fixed in versions 1:0.14.0-1.
Request was from Michael Tokarev <mjt@tls.msk.ru>
to control@bugs.debian.org.
(Sun, 30 Oct 2011 19:27:11 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Mon, 28 Nov 2011 07:34:24 GMT) (full text, mbox, link).
Bug unarchived.
Request was from Luk Claes <luk@debian.org>
to control@bugs.debian.org.
(Sat, 31 Dec 2011 00:00:41 GMT) (full text, mbox, link).
Bug No longer marked as fixed in versions 0.14.0+dfsg-1.
Request was from Luk Claes <luk@debian.org>
to control@bugs.debian.org.
(Sat, 31 Dec 2011 00:00:42 GMT) (full text, mbox, link).
Bug Marked as fixed in versions 0.14.0+dfsg-1~tls.
Request was from Luk Claes <luk@debian.org>
to control@bugs.debian.org.
(Sat, 31 Dec 2011 00:00:42 GMT) (full text, mbox, link).
Bug archived.
Request was from Luk Claes <luk@debian.org>
to control@bugs.debian.org.
(Sat, 31 Dec 2011 00:00:43 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Fri Nov 24 01:10:11 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.