drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in libvirt
Name: |
Mehrere Probleme in libvirt |
|
ID: |
USN-6734-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 |
|
Datum: |
Mo, 15. April 2024, 22:23 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494 |
|
Applikationen: |
libvirt |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4071587578335501971== Content-Language: en-CA Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------WyurX0swH3m8omPs4D7K01Xc"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------WyurX0swH3m8omPs4D7K01Xc Content-Type: multipart/mixed; boundary="------------2CpVxfinxhwFsPigQ7Y00C9B"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <f63fb2f2-7b9f-4524-9eb7-36d06c68886e@canonical.com> Subject: [USN-6734-1] libvirt vulnerabilities
--------------2CpVxfinxhwFsPigQ7Y00C9B Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6734-1 April 15, 2024
libvirt vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in libvirt.
Software Description: - libvirt: Libvirt virtualization toolkit
Details:
Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441)
It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494)
It was discovered that libvirt incorrectly handled detaching certain host interfaces. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2496)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10: libvirt-daemon 9.6.0-1ubuntu1.1 libvirt-daemon-system 9.6.0-1ubuntu1.1 libvirt0 9.6.0-1ubuntu1.1
Ubuntu 22.04 LTS: libvirt-daemon 8.0.0-1ubuntu7.10 libvirt-daemon-system 8.0.0-1ubuntu7.10 libvirt0 8.0.0-1ubuntu7.10
Ubuntu 20.04 LTS: libvirt-daemon 6.0.0-0ubuntu8.19 libvirt-daemon-system 6.0.0-0ubuntu8.19 libvirt0 6.0.0-0ubuntu8.19
After a standard system update you need to reboot your computer to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6734-1 CVE-2024-1441, CVE-2024-2494, CVE-2024-2496
Package Information: https://launchpad.net/ubuntu/+source/libvirt/9.6.0-1ubuntu1.1 https://launchpad.net/ubuntu/+source/libvirt/8.0.0-1ubuntu7.10 https://launchpad.net/ubuntu/+source/libvirt/6.0.0-0ubuntu8.19
--------------2CpVxfinxhwFsPigQ7Y00C9B--
--------------WyurX0swH3m8omPs4D7K01Xc Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmYdZNEACgkQZWnYVadE vpObnQ/9FBQWjj4ulM3bdl4aAU8fREemH4L6SWxpeaeET8XjRf/cyRM5xfinjBpY EAZff8KLijNNlX2BozegTRO0JzX5isY+9UFITcj1REVWCAxcC58O4wf9hicU7tSW xBuxBhtOW7QGjKQz2RMovp+36Ow+fX38m7+Z9FhI2zNdeUUrFDTM5jHxzzVRl+Ix X+bxGO5A/vAbmRW//MNtc+/DPRaQCd/8OpW15Qkry3sXocp+CAxgmOQhGwhsUkma RTTxbQgucpz3Mo5acTOpuMJoVPbluJ19UguOKA/tWRQy7135mS8uBoHNNcGgS7CC BLBUXRl/O6p6DSHSx/E3FWIWTmaa2ud5gv5+pP4oecafPalkUgXy/4/xvzyZHvzd ZJsvmGVizdguqtIyZF5GRSC+zKKtZy/fFSdSP2Mckxu8BvI8v2YxxRqcmr7F8uLk u+GnCX9yvvCymaJASVV0sHodNeD7I5WjoPfBex9Zt5CdPAnzU/7eqH6bdFaswwBU 7EfmkDAyNu8ksbpe/pMcUK1VIQIMDyVcpLS6xw/lsRPzcG4kvjA6LFTlh+0CpYUc AeFAde7hYWa9CGuKtA9h4CZ/VTU43cyVLRjgMb4RbyT/91FZ29mVIEx/Wl8N1S+X 3FiQPMf6rFiS+KLTakqxyLm/ksIdTKJWV2fQ3MUrSp2htRYfKUE= =72/n -----END PGP SIGNATURE-----
--------------WyurX0swH3m8omPs4D7K01Xc--
--===============4071587578335501971== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============4071587578335501971==--
|
|
|
|