Ubuntu 863-1: QEMU vulnerability

    Date 03 Dec 2009
    116
    Posted By LinuxSecurity Advisories
    It was discovered that QEMU did not properly setup the virtio networkingfeatures available to its guests. A remote attacker could exploit this tocrash QEMU guests which use virtio networking on Linux kernels earlierthan 2.6.26. [More...]
    ===========================================================
    Ubuntu Security Notice USN-863-1          December 03, 2009
    qemu-kvm vulnerability
    https://launchpad.net/bugs/458521
    ===========================================================
    
    A security issue affects the following Ubuntu releases:
    
    Ubuntu 9.10
    
    This advisory also applies to the corresponding versions of
    Kubuntu, Edubuntu, and Xubuntu.
    
    The problem can be corrected by upgrading your system to the
    following package versions:
    
    Ubuntu 9.10:
      qemu-kvm                        0.11.0-0ubuntu6.3
    
    After a standard system upgrade you need to restart any QEMU guests to
    effect the necessary changes.
    
    Details follow:
    
    It was discovered that QEMU did not properly setup the virtio networking
    features available to its guests. A remote attacker could exploit this to
    crash QEMU guests which use virtio networking on Linux kernels earlier
    than 2.6.26.
    
    
    Updated packages for Ubuntu 9.10:
    
      Source archives:
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3.diff.gz
          Size/MD5:    48984 14fa43af0ed17b918c50803f91b1480d
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3.dsc
          Size/MD5:     1377 18f25eed2408085a81ad70f39d74a835
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0.orig.tar.gz
          Size/MD5:  4382897 440837a062967102a68e634d57eaf719
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_amd64.deb
          Size/MD5:     9106 b15b1b8a62f13822a3932abd54a5f924
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_amd64.deb
          Size/MD5:  2813520 49b26fe83d6c4a5c9befd6716a3431a9
        https://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_amd64.deb
          Size/MD5:   636074 d9f0b9d5ff621c8b56b9fca53c0ae5d2
        https://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_amd64.deb
          Size/MD5: 15469258 dd6a9beb5c7d51b43785df232a3a3c40
        https://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_amd64.deb
          Size/MD5:     8560 2bb181fcf769aafd08d26aa531bb24a4
    
      i386 architecture (x86 compatible Intel/AMD):
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_i386.deb
          Size/MD5:     9104 0a0a8a786ad29625fe5aa3de79c5cd98
        https://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_i386.deb
          Size/MD5:  2592100 3023e22d5e6b3ff51fcf3641cd039e93
        https://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_i386.deb
          Size/MD5:   558556 5d369da01ec40b1d79b7e015d9982302
        https://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_i386.deb
          Size/MD5: 13984728 5464f6de725b919cdb4bd7252d221016
        https://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_i386.deb
          Size/MD5:     8562 3e34c884aff529f95a2975cdb08b2723
    
      lpia architecture (Low Power Intel Architecture):
    
        https://ports.ubuntu.com/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_lpia.deb
          Size/MD5:     9104 156a8ede19f2d65929e73f119415f1b7
        https://ports.ubuntu.com/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_lpia.deb
          Size/MD5:  2621316 02b4e9168fdacc9ab8955de557c64a7d
        https://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_lpia.deb
          Size/MD5:   578522 eb5a953dc2d59c2893656467bc879c25
        https://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_lpia.deb
          Size/MD5: 14110238 ee2d23ca2c7d25f37e5cb4d315730ad4
        https://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_lpia.deb
          Size/MD5:     8560 7c2df17d8e67444172c9093c28a01d71
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"121","title":"No ","votes":"10","type":"x","order":"2","pct":41.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.