A denial of service flaw was discovered in the Qemu processor emulator
and Kernel-based Virtual Machine (KVM) due to improper sanitization
of the length of the message sent to the host VNC server. A remote attacker
could use this flaw to cause an infinite loop via specially-crafted
VNC message sent to the particular virtual domain.
Created attachment 327669 [details]
This issue affects all versions of the Qemu/KVM packages, as shipped
with Fedora releases of 9, 10 and devel.
This issue does NOT affect the versions of the Xen packages, as shipped
with Red Hat Enterprise Linux 5 and Fedora releases of 9, 10 and devel.
I confirm this bug, and the fact that it goes away after the patch.
I'm planning to update F9 and F10. Any ETA about this patch going into qemu upstream? If it won't take too long, I'd rather not update rawhide for a while.
Qemu and KVM upstream has been informed already. The uptream commit should
appear in 1-2 days.
kvm-74-10.fc10 has been submitted as an update for Fedora 10.
kvm-65-15.fc9 has been submitted as an update for Fedora 9.
kvm-65-15.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
kvm-74-10.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
What about the Qemu package updates?
kvm upstream was fixed in version 82:
This issue was fixed in upstream qemu 0.10.0 (verified by looking at the sources since the changelog gives no useful info). As it stands, current Fedora 11 and 12 have 0.10.6 and 0.11.0 respectively, so only Fedora 10 (0.9.1) is affected by this issue.
I suppose at this point it's unlikely that Fedora 10 will get this fix, or can the qemu maintainer apply the patch to this (the attached patch should work, it's identical to what was used by upstream).