| From: |
| Marc Deslauriers <marc.deslauriers@canonical.com> |
| To: |
| ubuntu-security-announce@lists.ubuntu.com |
| Subject: |
| [USN-1692-1] QEMU vulnerability |
| Date: |
| Wed, 16 Jan 2013 13:32:19 -0500 |
| Message-ID: |
| <50F6F233.8050502@canonical.com> |
| Archive-link: |
| Article, Thread
|
==========================================================================
Ubuntu Security Notice USN-1692-1
January 16, 2013
qemu-kvm vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
QEMU could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
- qemu-kvm: Machine emulator and virtualizer
Details:
It was discovered that QEMU incorrectly handled certain e1000 packet sizes.
In certain environments, an attacker may use this flaw in combination with
large packets to cause a denial of service or execute arbitrary code in the
guest.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
qemu-kvm 1.2.0+noroms-0ubuntu2.12.10.2
Ubuntu 12.04 LTS:
qemu-kvm 1.0+noroms-0ubuntu14.7
Ubuntu 11.10:
qemu-kvm 0.14.1+noroms-0ubuntu6.6
Ubuntu 10.04 LTS:
qemu-kvm 0.12.3+noroms-0ubuntu9.21
After a standard system update you need to restart your virtual machines to
make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1692-1
CVE-2012-6075
Package Information:
https://launchpad.net/ubuntu/+source/qemu-kvm/1.2.0+norom...
https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-...
https://launchpad.net/ubuntu/+source/qemu-kvm/0.14.1+noro...
https://launchpad.net/ubuntu/+source/qemu-kvm/0.12.3+noro...
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
(
Log in to post comments)