drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in libvirt
Name: |
Mehrere Probleme in libvirt |
|
ID: |
USN-1954-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04 |
|
Datum: |
Mi, 18. September 2013, 18:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651 |
|
Applikationen: |
libvirt |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============8059270275414955231== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig62B71A7DB9EB26D689134E3B"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig62B71A7DB9EB26D689134E3B Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1954-1 September 18, 2013
libvirt vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in libvirt.
Software Description: - libvirt: Libvirt virtualization toolkit
Details:
It was discovered that libvirt used the pkcheck tool in an unsafe manner. A local attacker could possibly use this flaw to bypass polkit authentication. In Ubuntu, libvirt polkit authentication is not enabled by default. (CVE-2013-4311)
It was discovered that libvirt incorrectly handled certain memory stats requests. A remote attacker could use this issue to cause libvirt to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 12.10, and Ubuntu 13.04. (CVE-2013-4296)
It was discovered that libvirt incorrectly handled certain bitmap operations. A remote attacker could use this issue to cause libvirt to crash, resulting in a denial of service. This issue only affected Ubuntu 13.04. (CVE-2013-5651)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.04: libvirt-bin 1.0.2-0ubuntu11.13.04.4 libvirt0 1.0.2-0ubuntu11.13.04.4
Ubuntu 12.10: libvirt-bin 0.9.13-0ubuntu12.5 libvirt0 0.9.13-0ubuntu12.5
Ubuntu 12.04 LTS: libvirt-bin 0.9.8-2ubuntu17.13 libvirt0 0.9.8-2ubuntu17.13
Ubuntu 10.04 LTS: libvirt-bin 0.7.5-5ubuntu27.24 libvirt0 0.7.5-5ubuntu27.24
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1954-1 CVE-2013-4296, CVE-2013-4311, CVE-2013-5651
Package Information: https://launchpad.net/ubuntu/+source/libvirt/1.0.2-0ubuntu11.13.04.4 https://launchpad.net/ubuntu/+source/libvirt/0.9.13-0ubuntu12.5 https://launchpad.net/ubuntu/+source/libvirt/0.9.8-2ubuntu17.13 https://launchpad.net/ubuntu/+source/libvirt/0.7.5-5ubuntu27.24
--------------enig62B71A7DB9EB26D689134E3B Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJSOcFgAAoJEGVp2FWnRL6TVvcQAIB5vYMzCxgWITKG+HMFbhfg az1BfsaYssP+ceah1yZnX+3AopxTVMNSI0LwRSh+vhS0T0eziE947P0em2hUGBwN ins2dw+bc+taE+YO+SwPtQlg/oid5/uslo82Msik1bQO5VLSI6ytT1BJ2Cn0ljU0 AvcANpM3VQeN1BGe8tM0pMAGRsUaqd6nya2LDlQUimb2UsZXpNo2t60/BXA2epKY cFuEahpXzk5rRlLMQ7vYAnr0CtiudzUgUDmc+JaS+PSr9Gzh12FBcp4rx57U++Ay b2j05d6pT3yTWfa9IxEaJW5CT7i9dXB/fFRzS3qP+ey6AMKJs89qvwp/2zaAT/HU O0RDf0jnaNt0JomVRc8tZahoadXn3eNeS0VdPhfE64H+htYlDPJvuI+veK1ifj8p 5M6IlbxWQ19+aCN2vYRaRt5WYkBGVhfMLpUul97idf8GwtvT0LrKZJf/3RwGhWxT IM2qX6QZIRb9xRfne2jd21w5EyXVFo9tkxGqwHR4kHK9esLge1ItV9lvcCvTbNQ0 StsXPHL68VQblINfAeh2lx96KAmKmFLKQlgqUDRFFX87mELpnODVVUfRyc7jnvVH moY6hDjiHnWzfZfHv3HPLPsAlWgX9ulma6QrLP5pbcl5vJxdXLzzgTEk/3Jyj6L9 +/XDhAwcDJ4nQWVS0aXk =qFY6 -----END PGP SIGNATURE-----
--------------enig62B71A7DB9EB26D689134E3B--
--===============8059270275414955231== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8059270275414955231==--
|
|
|
|