On Wed, Jan 26, 2011 at 08:56:06AM +0300, Michael Tokarev wrote:
> 26.01.2011 00:25, Moritz Muehlenhoff wrote:
> > Package: kvm
> > Severity: grave
> > Tags: security
> > 
> > Please see the following entry in the Red Hat bugzilla:
> > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0011 
> 
> Yes, I've seen this even before CVE ID were assigned.
> 
> > The impact is not entirely obvious to me? Do I understand it
> > correctly that a malicious application accessing a KVM
> > instance could lock out other apps to this virtual machine?
> 
> This is completely wrong understanding.
> 
> First of all, only one instance is affected.
> 
> Second, this is an intended behavour.  Emty vnc password
> meant to be no authentication, not a lockdown.  When you
> start it without specifying a password it lets everyone
> in.
> 
> There was a bug in previous versions of qemu which is now
> fixed by the commit mentioned in that RH bugreport.  A bug
> which resulted in inability to change vnc to "no auth" mode
> at runtime if a password has been specified.
> 
> The implication is this: if there was an application that
> relied on the wrong behavour, "thinking" that changing VNC
> password at runtime to an empty string means a lockdown,
> that combination is now broken, since instead of a lockdown
> we're getting wide-open access.  But I'm not aware of any
> application like that.

Thanks for the verbose explanation. I've updated the Debian 
Security Tracker.

While we're at it; could you please also look into 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?

Is this something that still needs to be fixed for Squeeze?

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to