Debian: DSA-1846-1: New kvm packages fix denial of service

    Date29 Jul 2009
    CategoryDebian
    122
    Posted ByLinuxSecurity Advisories
    Matt T. Yourst discovered an issue in the kvm subsystem. Local users with permission to manipulate /dev/kvm can cause a denial of service (hang) by providing an invalid cr3 value to the KVM_SET_SREGS call.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1846-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Dann Frazier
    July 28, 2009                         http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : kvm
    Vulnerability  : denial of service
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2009-2287
    
    Matt T. Yourst discovered an issue in the kvm subsystem. Local
    users with permission to manipulate /dev/kvm can cause a denial
    of service (hang) by providing an invalid cr3 value to the
    KVM_SET_SREGS call.
    
    For the stable distribution (lenny), these problems have been fixed
    in version 72+dfsg-5~lenny2.
    
    For the unstable distribution (sid), these problems will be fixed soon.
    
    We recommend that you upgrade your kvm packages, and rebuild any kernel
    modules you have built from a kvm-source package version.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Stable updates are available for amd64 and i386.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg.orig.tar.gz
        Size/MD5 checksum:  3250251 899a66ae2ea94e994e06f637e1afef4a
      http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny2.dsc
        Size/MD5 checksum:     1340 e95d1e3129dd6eb2d7b139504a8682d5
      http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny2.diff.gz
        Size/MD5 checksum:    40508 22d3f4b490752c1db13affc506896f59
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/k/kvm/kvm-source_72+dfsg-5~lenny2_all.deb
        Size/MD5 checksum:   157856 593b7d018dc15553d1c690c941ff0dd7
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny2_amd64.deb
        Size/MD5 checksum:  1105650 e29a433d9d83be7bf22dfb8297e3b63f
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/k/kvm/kvm_72+dfsg-5~lenny2_i386.deb
        Size/MD5 checksum:  1034054 39113a71cf5fdbafcaed9f3f58ae2369
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"2","type":"x","order":"2","pct":50,"resources":[]},{"id":"86","title":"No","votes":"2","type":"x","order":"3","pct":50,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.