2018-08-29 06:06:09 |
Christian Ehrhardt |
bug |
|
|
added bug |
2018-08-29 06:36:57 |
Christian Ehrhardt |
bug watch added |
|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907500 |
|
2018-08-29 06:36:57 |
Christian Ehrhardt |
bug task added |
|
qemu (Debian) |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
nominated for series |
|
Ubuntu Xenial |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
bug task added |
|
qemu (Ubuntu Xenial) |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
nominated for series |
|
Ubuntu Trusty |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
bug task added |
|
qemu (Ubuntu Trusty) |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
nominated for series |
|
Ubuntu Cosmic |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
bug task added |
|
qemu (Ubuntu Cosmic) |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
nominated for series |
|
Ubuntu Bionic |
|
2018-08-29 06:44:40 |
Christian Ehrhardt |
bug task added |
|
qemu (Ubuntu Bionic) |
|
2018-08-29 06:44:57 |
Christian Ehrhardt |
qemu (Ubuntu Trusty): assignee |
|
Ubuntu Security Team (ubuntu-security) |
|
2018-08-29 06:45:02 |
Christian Ehrhardt |
qemu (Ubuntu Xenial): assignee |
|
Ubuntu Security Team (ubuntu-security) |
|
2018-08-29 06:45:06 |
Christian Ehrhardt |
qemu (Ubuntu Bionic): assignee |
|
Christian Ehrhardt (paelzer) |
|
2018-08-29 06:45:07 |
Christian Ehrhardt |
qemu (Ubuntu Cosmic): assignee |
|
Christian Ehrhardt (paelzer) |
|
2018-08-29 06:45:11 |
Christian Ehrhardt |
qemu (Ubuntu Bionic): status |
New |
Triaged |
|
2018-08-29 06:45:13 |
Christian Ehrhardt |
qemu (Ubuntu Cosmic): status |
New |
In Progress |
|
2018-08-29 06:45:17 |
Christian Ehrhardt |
qemu (Ubuntu Cosmic): importance |
Undecided |
High |
|
2018-08-29 06:45:20 |
Christian Ehrhardt |
qemu (Ubuntu Bionic): importance |
Undecided |
High |
|
2018-08-29 06:46:45 |
Christian Ehrhardt |
bug |
|
|
added subscriber James Page |
2018-08-29 08:13:31 |
Bug Watch Updater |
qemu (Debian): status |
Unknown |
Confirmed |
|
2018-08-29 18:52:37 |
Seth Arnold |
information type |
Private Security |
Public Security |
|
2018-08-30 07:09:57 |
Christian Ehrhardt |
qemu (Ubuntu Trusty): status |
New |
Won't Fix |
|
2018-08-30 07:10:00 |
Christian Ehrhardt |
qemu (Ubuntu Xenial): status |
New |
Won't Fix |
|
2018-08-30 07:10:11 |
Christian Ehrhardt |
qemu (Ubuntu Bionic): assignee |
Christian Ehrhardt (paelzer) |
Ubuntu Security Team (ubuntu-security) |
|
2018-09-04 18:53:45 |
Launchpad Janitor |
qemu (Ubuntu Cosmic): status |
In Progress |
Fix Released |
|
2018-09-04 18:53:45 |
Launchpad Janitor |
cve linked |
|
2018-15746 |
|
2018-09-06 18:23:41 |
Bryan Quigley |
bug |
|
|
added subscriber Bryan Quigley |
2018-09-07 07:07:21 |
Dominique Poulain |
bug |
|
|
added subscriber Dominique Poulain |
2018-09-13 10:06:24 |
Christian Ehrhardt |
description |
The Qemu changes are public, so nothing to hide here IMHO, but leaving that to the security team.
Copy from the related Debian bug that I commented on:
"
The following vulnerability was published for qemu.
CVE-2018-15746[0]:
seccomp: blacklist is not applied to all threads
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2018-15746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746
[1] https://lists.gnu.org/archive/html/qemu-devel/2018-08/msg04892.html
[2] https://lists.gnu.org/archive/html/qemu-devel/2018-08/msg02289.html
"
In addition I think that:
- it is available (built in since all still supported releases)
- it is default enabled with qemu 2.11 (Bionic)
- with libvirt >4.3 (Cosmic) more of the filters are set
That in my bad security severity guessing capability makes it
- Medium prio <Bionic
- High prio >=Bionic
OTOH, when checking the upstream reproducer with a qemu 2.11 I see nothing being used - so maybe all of it is a red herring (checked on Bionic):
$ for pid in $(pidof qemu-system-x86_64); do echo PID $pid; for task in /proc/$pid/task/*; do cat $task/status | grep Secc; done; done
PID 10817
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
PID 10657
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
PID 438
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0 |
[Impact]
* Backport upstream CVE fix (applies as-is)
* This will ensure that the seccomp rules apply to all threads.
Without that the security benefit that seccomp provides can be avoided
by an attacker.
[Test Case]
* Run qemu on Bionic, and enable the seccomp feature (not yet default on
in Bionic, but in Cosmic). In qemu this is called "sandbox"
$ qemu-system-x86_64 -sandbox on -nographic & pid=$!; sleep 2s;
echo PID $pid; for task in /proc/$pid/task/*; do cat $task/status | grep Secc; done; kill -9 $pid
That will report something like
PID 23230
Seccomp: 2
Seccomp: 0
And the two lines should match.
[Regression Potential]
* discussion of how regressions are most likely to manifest as a result of this change.
* It is assumed that any SRU candidate patch is well-tested before
upload and has a low overall risk of regression, but it's important
to make the effort to think about what ''could'' happen in the
event of a regression.
* This both shows the SRU team that the risks have been considered,
and provides guidance to testers in regression-testing the SRU.
[Other Info]
* This was discussed for other releases e.g. Xenial, but back then the
approach to seccomp was different and regression risk would be too
high.
----
The Qemu changes are public, so nothing to hide here IMHO, but leaving that to the security team.
Copy from the related Debian bug that I commented on:
"
The following vulnerability was published for qemu.
CVE-2018-15746[0]:
seccomp: blacklist is not applied to all threads
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2018-15746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746
[1] https://lists.gnu.org/archive/html/qemu-devel/2018-08/msg04892.html
[2] https://lists.gnu.org/archive/html/qemu-devel/2018-08/msg02289.html
"
In addition I think that:
- it is available (built in since all still supported releases)
- it is default enabled with qemu 2.11 (Bionic)
- with libvirt >4.3 (Cosmic) more of the filters are set
That in my bad security severity guessing capability makes it
- Medium prio <Bionic
- High prio >=Bionic
OTOH, when checking the upstream reproducer with a qemu 2.11 I see nothing being used - so maybe all of it is a red herring (checked on Bionic):
$ for pid in $(pidof qemu-system-x86_64); do echo PID $pid; for task in /proc/$pid/task/*; do cat $task/status | grep Secc; done; done
PID 10817
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
PID 10657
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
PID 438
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0
Seccomp: 0 |
|
2018-09-27 12:35:42 |
Łukasz Zemczak |
qemu (Ubuntu Bionic): status |
Triaged |
Fix Committed |
|
2018-09-27 12:35:43 |
Łukasz Zemczak |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2018-09-27 12:35:46 |
Łukasz Zemczak |
bug |
|
|
added subscriber SRU Verification |
2018-09-27 12:35:48 |
Łukasz Zemczak |
tags |
|
verification-needed verification-needed-bionic |
|
2018-09-27 14:52:18 |
Christian Ehrhardt |
tags |
verification-needed verification-needed-bionic |
verification-done verification-done-bionic |
|
2018-10-08 13:17:50 |
Launchpad Janitor |
qemu (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2018-10-08 13:18:06 |
Łukasz Zemczak |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2018-10-10 12:49:59 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~paelzer/ubuntu/+source/qemu/+git/qemu/+merge/356406 |
|
2019-04-19 04:09:35 |
Bug Watch Updater |
qemu (Debian): status |
Confirmed |
Fix Released |
|