| From: |
| Marc Deslauriers <marc.deslauriers@canonical.com> |
| To: |
| ubuntu-security-announce@lists.ubuntu.com |
| Subject: |
| [USN-1708-1] libvirt vulnerabilities |
| Date: |
| Tue, 29 Jan 2013 11:41:56 -0500 |
| Message-ID: |
| <5107FBD4.7090308@canonical.com> |
| Archive-link: |
| Article, Thread
|
==========================================================================
Ubuntu Security Notice USN-1708-1
January 29, 2013
libvirt vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
libvirt could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
- libvirt: Libvirt virtualization toolkit
Details:
Wenlong Huang discovered that libvirt incorrectly handled certain RPC
calls. A remote attacker could exploit this and cause libvirt to crash,
resulting in a denial of service. This issue only affected Ubuntu 12.04
LTS. (CVE-2012-4423)
Tingting Zheng discovered that libvirt incorrectly handled cleanup under
certain error conditions. A remote attacker could exploit this and cause
libvirt to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2013-0170)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libvirt-bin 0.9.13-0ubuntu12.2
libvirt0 0.9.13-0ubuntu12.2
Ubuntu 12.04 LTS:
libvirt-bin 0.9.8-2ubuntu17.7
libvirt0 0.9.8-2ubuntu17.7
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1708-1
CVE-2012-4423, CVE-2013-0170
Package Information:
https://launchpad.net/ubuntu/+source/libvirt/0.9.13-0ubun...
https://launchpad.net/ubuntu/+source/libvirt/0.9.8-2ubunt...
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
(
Log in to post comments)