Your message dated Thu, 15 Dec 2022 14:44:17 +0000
with message-id <[email protected]>
and subject line Bug#1021019: fixed in qemu 1:7.2+dfsg-1
has caused the Debian Bug report #1021019,
regarding qemu: CVE-2022-3165
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1021019: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021019
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: qemu
X-Debbugs-CC: [email protected]
Severity: important
Tags: security
Hi,
The following vulnerability was published for qemu.
CVE-2022-3165[0]:
VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion
https://bugzilla.redhat.com/show_bug.cgi?id=2129739
Introduced by:
https://gitlab.com/qemu-project/qemu/-/commit/0bf41cab93e5c72dcda717abd625698b59d9ba3e
(v6.1.0-rc0)
Proposed fix:
https://lists.nongnu.org/archive/html/qemu-devel/2022-09/msg03948.html
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2022-3165
https://www.cve.org/CVERecord?id=CVE-2022-3165
Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Source: qemu
Source-Version: 1:7.2+dfsg-1
Done: Michael Tokarev <[email protected]>
We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Tokarev <[email protected]> (supplier of updated qemu package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 15 Dec 2022 17:17:28 +0300
Source: qemu
Architecture: source
Version: 1:7.2+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <[email protected]>
Changed-By: Michael Tokarev <[email protected]>
Closes: 1011003 1018254 1021019 1021981 1025123
Changes:
qemu (1:7.2+dfsg-1) unstable; urgency=medium
.
* new upstream release
Closes: #1025123 CVE-2022-4172
(erst: undefined behavior in memcpy in write_erst_record)
Closes: #1021981 qemu-user: faccessat2 is not implemented
Closes: #1021019 CVE-2022-3165 (VNC: integer underflow in
vnc_client_cut_text_ext leads to CPU exhaustion)
* remove patches applied upstream
* refresh note-missing-module-pkg-name.diff
* slirp is always external package now, not a submodule anymore
* d/control: require meson >> 0.61.5~ for build
* spelling.diff: update with more spelling error
* add some lintian-overrides
* fix minor spelling errors in patches
* d/control: Bump Standards-Version to 4.6.1
* debian shell programs use "which" instead of the "command -v",
fix that (Closes: #1018254)
* Better fix for #1019011 (gcc ICE building palcode-clipper), use -O1
instead of -O2 for the failing compile when it actually fails
(no need to depend on gcc-11, Closes: #1011003)
Checksums-Sha1:
a81c80c59a38517edf91e08a440eca05738b4d60 6450 qemu_7.2+dfsg-1.dsc
6ea9655c72a2f21ed0d301479e11194c84978514 23523172 qemu_7.2+dfsg.orig.tar.xz
4aaf49ee0d98359c1a17970d17c71f7f521bbf3e 101680 qemu_7.2+dfsg-1.debian.tar.xz
7ff0503ca1d860f9fd4f3a9813ed9e1a37798099 10956 qemu_7.2+dfsg-1_source.buildinfo
Checksums-Sha256:
31040a83f99772584bb93efcf326aaa60481d018d3c635cbefb30f2c6227e5ad 6450
qemu_7.2+dfsg-1.dsc
91aca71520040edc40b8d437aa3004dae614f58e286cf653ee8996c07af2962f 23523172
qemu_7.2+dfsg.orig.tar.xz
8d950d3b456325614a36dd2b40d75631a5934b63428a1a8d2cb3188aef8ea11e 101680
qemu_7.2+dfsg-1.debian.tar.xz
87a7f6e3737da28dbd4e42fafdc89306883ac77a7eef21947cf6ab140c62602f 10956
qemu_7.2+dfsg-1_source.buildinfo
Files:
eb0a6035b15dd5e77c434d9f25e8c8a1 6450 otherosfs optional qemu_7.2+dfsg-1.dsc
865ae004abc45245029b6812734365c8 23523172 otherosfs optional
qemu_7.2+dfsg.orig.tar.xz
aaed64635a3f790a25eb82cb85e40bc3 101680 otherosfs optional
qemu_7.2+dfsg-1.debian.tar.xz
3ab052996ed8fd75aefdf9f26aeb7440 10956 otherosfs optional
qemu_7.2+dfsg-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQFDBAEBCAAtFiEEe3O61ovnosKJMUsicBtPaxppPlkFAmObLVAPHG1qdEB0bHMu
bXNrLnJ1AAoJEHAbT2saaT5ZF4IH/1uK5G/Yej3OMC2L0vnpduMHPZO46qvWLlej
RkoVL7X85sorxedFUQCBv/FhCsybdZjtF055OKwmpc8UcTwuWNWrj/wZ5nZuAMpI
TIjRetd/t38dbxjEk1+iBIfnYZ6JLeNtNYW2qxtdn1OsVjX3It0jF8RgEMImFzyc
3Cxq243fmFGufBHowAOZ3qAvakCdQb+8naOaB2xZkTROy75m2cO3SQ89ZZVubWYF
iE5sIFFGlflrhb+434O6JI4fNfITMoK/8wn2+Lt60Oy5K6tYmjGZGmwndKefrZYo
ZXFO6HU5iPL3VkrQn6U/Dhu8yrOACPwLZeY5vu34eHVerFjhWdI=
=pEqp
-----END PGP SIGNATURE-----
--- End Message ---