Your message dated Wed, 13 May 2020 10:19:04 +0000
with message-id <[email protected]>
and subject line Bug#959746: fixed in qemu 1:5.0-5
has caused the Debian Bug report #959746,
regarding qemu: CVE-2020-10717
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
959746: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959746
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: qemu
Version: 1:5.0-4
Severity: important
Tags: security upstream

Hi,

The following vulnerability was published for qemu. Unless mistaken
this issue is introduced with upstream 01a6dc95ec7f ("virtiofsd: set
maximum RLIMIT_NOFILE limit") in 5.0.0-rc0.

CVE-2020-10717[0]:
| virtiofsd: stay below fs.file-max sysctl value

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-10717
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717
[1] https://www.openwall.com/lists/oss-security/2020/05/04/1

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: qemu
Source-Version: 1:5.0-5
Done: Michael Tokarev <[email protected]>

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <[email protected]> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 13 May 2020 12:57:19 +0300
Source: qemu
Architecture: source
Version: 1:5.0-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <[email protected]>
Changed-By: Michael Tokarev <[email protected]>
Closes: 959746
Changes:
 qemu (1:5.0-5) unstable; urgency=medium
 .
   * more binfmt-install updates
   * CVE-2020-10717 fix from upstream:
     virtiofsd-add-rlimit-nofile-NUM-option.patch (preparational) and
     virtiofsd-stay-below-fs.file-max-CVE-2020-10717.patch
     (Closes: #959746, CVE-2020-10717)
   * 2 patches from upstream/stable to fix io_uring fd set buildup:
     
aio-posix-dont-duplicate-fd-handler-deletion-in-fdmon_io_uring_destroy.patch
     aio-posix-disable-fdmon-io_uring-when-GSource-is-used.patch
   * upstream stable fix: hostmem-dont-use-mbind-if-host-nodes-is-empty.patch
   * upstream stable fix:
     net-use-peer-when-purging-queue-in-qemu_flush_or_purge_queue_packets.patch
Checksums-Sha1:
 d4480adcfdf02bcf30633d38f0c5dc700825edea 6800 qemu_5.0-5.dsc
 8d58d228f40a86f4e43bdd7fcc2806c23c9c0772 89024 qemu_5.0-5.debian.tar.xz
 cd4da4f99d23ae8032344b4afb37a3ad87a1532e 9244 qemu_5.0-5_source.buildinfo
Checksums-Sha256:
 4303c8968fb1bb4a77685b96367edf739e8c315cce78895a608bdb96b1b4f761 6800 
qemu_5.0-5.dsc
 acba381809781aa594e60389697a67f94c07707f2474e6c7207ed99401f2b9cf 89024 
qemu_5.0-5.debian.tar.xz
 6e074244ee4ac0d4f976f9ed2c06d416fce4825a42a3ecfd8e10ef833fb72925 9244 
qemu_5.0-5_source.buildinfo
Files:
 17f5ce02b1c7d2621a86331adaea5c51 6800 otherosfs optional qemu_5.0-5.dsc
 e659a10b8f98be465b9f0bd01b25f380 89024 otherosfs optional 
qemu_5.0-5.debian.tar.xz
 2174b2456c1e9d206deb9d9a61d86ece 9244 otherosfs optional 
qemu_5.0-5_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQFDBAEBCAAtFiEEe3O61ovnosKJMUsicBtPaxppPlkFAl67xU0PHG1qdEB0bHMu
bXNrLnJ1AAoJEHAbT2saaT5ZwaIH/247mSiankkDQ3pAYivRKroOWqKUNMSAWFgL
AMhTTJpmcGjx6dm+QGoydMq8AN2rVJ/ReofFKbXSxf9OhuuzbnxPxosgGoW5Kwe3
MwvS4kZ5ZwRYU/kJ7kw4wRW+0Ni+NKOj9kHO9Wca/RoPIKgriCLengfD5C357Eul
7DcxwdwKhG0LE8A4T3HxlqgiBZkQBNfuV4AkObFn5ysbnJnOoQiVbOkeHHLI9jRJ
aCwb5cXhKxA+Nz4q4GsIHDSdJxfDrnetsfon+7wW1Zc54FO4YRDfG7rilG5qNWQD
NBuCdfQR6MA1MLTm2SMaxntw4MdiDEYMmf+j+2pdv/ADiJLUCvg=
=MZsL
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to