Login
Newsletter
Werbung

Sicherheit: Denial of Service in QEMU
Aktuelle Meldungen Distributionen
Name: Denial of Service in QEMU
ID: USN-863-1
Distribution: Ubuntu
Plattformen: Ubuntu 9.10
Datum: Do, 3. Dezember 2009, 21:12
Referenzen: https://launchpad.net/bugs/458521
Applikationen: QEMU

Originalnachricht


--===============3707981332548119199==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="eAbsdosE1cNLO4uF"
Content-Disposition: inline


--eAbsdosE1cNLO4uF
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

===========================================================
Ubuntu Security Notice USN-863-1 December 03, 2009
qemu-kvm vulnerability
https://launchpad.net/bugs/458521
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
qemu-kvm 0.11.0-0ubuntu6.3

After a standard system upgrade you need to restart any QEMU guests to
effect the necessary changes.

Details follow:

It was discovered that QEMU did not properly setup the virtio networking
features available to its guests. A remote attacker could exploit this to
crash QEMU guests which use virtio networking on Linux kernels earlier
than 2.6.26.


Updated packages for Ubuntu 9.10:

Source archives:

qemu-kvm_0.11.0-0ubuntu6.3.diff.gz
Size/MD5: 48984 14fa43af0ed17b918c50803f91b1480d
qemu-kvm_0.11.0-0ubuntu6.3.dsc
Size/MD5: 1377 18f25eed2408085a81ad70f39d74a835
qemu-kvm_0.11.0.orig.tar.gz
Size/MD5: 4382897 440837a062967102a68e634d57eaf719

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_amd64.deb
Size/MD5: 9106 b15b1b8a62f13822a3932abd54a5f924
qemu-kvm_0.11.0-0ubuntu6.3_amd64.deb
Size/MD5: 2813520 49b26fe83d6c4a5c9befd6716a3431a9
qemu-arm-static_0.11.0-0ubuntu6.3_amd64.deb
Size/MD5: 636074 d9f0b9d5ff621c8b56b9fca53c0ae5d2
qemu-kvm-extras_0.11.0-0ubuntu6.3_amd64.deb
Size/MD5: 15469258 dd6a9beb5c7d51b43785df232a3a3c40
qemu_0.11.0-0ubuntu6.3_amd64.deb
Size/MD5: 8560 2bb181fcf769aafd08d26aa531bb24a4

i386 architecture (x86 compatible Intel/AMD):

kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_i386.deb
Size/MD5: 9104 0a0a8a786ad29625fe5aa3de79c5cd98
qemu-kvm_0.11.0-0ubuntu6.3_i386.deb
Size/MD5: 2592100 3023e22d5e6b3ff51fcf3641cd039e93
qemu-arm-static_0.11.0-0ubuntu6.3_i386.deb
Size/MD5: 558556 5d369da01ec40b1d79b7e015d9982302
qemu-kvm-extras_0.11.0-0ubuntu6.3_i386.deb
Size/MD5: 13984728 5464f6de725b919cdb4bd7252d221016
qemu_0.11.0-0ubuntu6.3_i386.deb
Size/MD5: 8562 3e34c884aff529f95a2975cdb08b2723

lpia architecture (Low Power Intel Architecture):

kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_lpia.deb
Size/MD5: 9104 156a8ede19f2d65929e73f119415f1b7
qemu-kvm_0.11.0-0ubuntu6.3_lpia.deb
Size/MD5: 2621316 02b4e9168fdacc9ab8955de557c64a7d
qemu-arm-static_0.11.0-0ubuntu6.3_lpia.deb
Size/MD5: 578522 eb5a953dc2d59c2893656467bc879c25
qemu-kvm-extras_0.11.0-0ubuntu6.3_lpia.deb
Size/MD5: 14110238 ee2d23ca2c7d25f37e5cb4d315730ad4
qemu_0.11.0-0ubuntu6.3_lpia.deb
Size/MD5: 8560 7c2df17d8e67444172c9093c28a01d71



--eAbsdosE1cNLO4uF
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAksYGQAACgkQW0JvuRdL8BrNQACfScCAdIfUNm2VtSPcMCN2MEIj
kxcAn03InrjpFS+mosKgV7LWqtBa0WOG
=W7sT
-----END PGP SIGNATURE-----

--eAbsdosE1cNLO4uF--


--===============3707981332548119199==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3707981332548119199==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung