Control: severity -1 wishlist
Control: tag -1 + upstream confirmed

On 02.05.2025 10:54, Jacob Lifshay wrote:
Source: qemu
Version: 1:7.2+dfsg-7+deb12u12
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: programmerj...@gmail.com, Debian Security Team 
<t...@security.debian.org>

Dear Maintainer,

I found a timing side-channel while reading through the source of crypto/aes.c
I initially reported a security issue to upstream, they told me that since it's
only used by TCG and TCG is not considered secure, they don't consider it a
security issue. I then reported the security issue to debian, I was told to
create an upstream bug and a matching debian bug.

https://gitlab.com/qemu-project/qemu/-/issues/2946
...

I don't see the reason for this bug report either.  TCG is not used for
for any security-sensitive processing.  If you need to run a real guest,
you should use kvm instead (and run your guest on a native processor),
and there, hardware implementation of AES is used.

Yes, in TCG mode, we've a timing "issue", and it'd be nice if it had no
security implications, but it's definitely of a very low priority.

Thanks,

/mjt

Reply via email to