Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libvirt
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libvirt
ID: USN-1954-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04
Datum: Mi, 18. September 2013, 18:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651
Applikationen: libvirt

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============8059270275414955231==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig62B71A7DB9EB26D689134E3B"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig62B71A7DB9EB26D689134E3B
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1954-1
September 18, 2013

libvirt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in libvirt.

Software Description:
- libvirt: Libvirt virtualization toolkit

Details:

It was discovered that libvirt used the pkcheck tool in an unsafe manner. A
local attacker could possibly use this flaw to bypass polkit
authentication. In Ubuntu, libvirt polkit authentication is not enabled by
default. (CVE-2013-4311)

It was discovered that libvirt incorrectly handled certain memory stats
requests. A remote attacker could use this issue to cause libvirt to
crash, resulting in a denial of service. This issue only affected Ubuntu
12.04 LTS, Ubuntu 12.10, and Ubuntu 13.04. (CVE-2013-4296)

It was discovered that libvirt incorrectly handled certain bitmap
operations. A remote attacker could use this issue to cause libvirt to
crash, resulting in a denial of service. This issue only affected Ubuntu
13.04. (CVE-2013-5651)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
libvirt-bin 1.0.2-0ubuntu11.13.04.4
libvirt0 1.0.2-0ubuntu11.13.04.4

Ubuntu 12.10:
libvirt-bin 0.9.13-0ubuntu12.5
libvirt0 0.9.13-0ubuntu12.5

Ubuntu 12.04 LTS:
libvirt-bin 0.9.8-2ubuntu17.13
libvirt0 0.9.8-2ubuntu17.13

Ubuntu 10.04 LTS:
libvirt-bin 0.7.5-5ubuntu27.24
libvirt0 0.7.5-5ubuntu27.24

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1954-1
CVE-2013-4296, CVE-2013-4311, CVE-2013-5651

Package Information:
https://launchpad.net/ubuntu/+source/libvirt/1.0.2-0ubuntu11.13.04.4
https://launchpad.net/ubuntu/+source/libvirt/0.9.13-0ubuntu12.5
https://launchpad.net/ubuntu/+source/libvirt/0.9.8-2ubuntu17.13
https://launchpad.net/ubuntu/+source/libvirt/0.7.5-5ubuntu27.24



--------------enig62B71A7DB9EB26D689134E3B
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=qFY6
-----END PGP SIGNATURE-----

--------------enig62B71A7DB9EB26D689134E3B--


--===============8059270275414955231==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8059270275414955231==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung