U radu programskog paketa qemu otkrivena su tri nedostatka koja udaljeni napadač može iskoristiti za rušenje aplikacije, čitanje/izmjenu određenih podataka ili pokretanje proizvoljnog programskog koda.
Paket:
qemu 0.x
Operacijski sustavi:
Fedora 15, Fedora 16
Kritičnost:
7.4
Problem:
pogreška u programskoj funkciji, pogreška u programskoj komponenti, preljev međuspremnika
Propusti su posljedica pogrešaka u funkciji "process_tx_desc", upravljačkom programu "virtio-blk" te propusta pri pokretanju aplikacije s root ovlastima s opcijom "-runas".
Posljedica:
Navedene propuste zlonamjerni korisnik može iskoristiti za rušenje aplikacije, dobivanje većih ovlasti ili izvršavanje proizvoljnog programskog koda.
Rješenje:
Kako bi se zaštitili, korisnicima se savjetuje korištenje nadogradnje.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8592
2012-05-29 21:36:09
--------------------------------------------------------------------------------
Name : qemu
Product : Fedora 16
Version : 0.15.1
Release : 5.fc16
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:
* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.
As QEMU requires no host kernel patches to run, it is safe and easy to use.
--------------------------------------------------------------------------------
Update Information:
* CVE-2012-0029 e1000 buffer overflow (bz 825895, bz 772075)
* virtio-blk: refuse SG_IO requests with scsi=off (bz 826042)
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 29 2012 Cole Robinson <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.15.1-5
- CVE-2012-0029 e1000 buffer overflow (bz 783984, bz 772075)
- virtio-blk: refuse SG_IO requests with scsi=off (bz 826042)
* Mon Jan 30 2012 Justin M. Forbes <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.15.1-4
- Add vhost-net to kvm.modules
- Fix USB passthrough assert on packet completion (#769625)
-
* Thu Jan 5 2012 Christophe Fergeau <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.15.1-3.1
- Backport patches from qemu 1.0 to fix floppy drives (#753863)
* Fri Nov 18 2011 Justin M. Forbes <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.15.1-3
- Enable support for fedora-13 machine type (#748218)
- don't force ksm enable on updates (#754946)
* Thu Nov 3 2011 Justin M. Forbes <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.15.1-2
- Fix POSTIN scriplet failure (#748281)
* Fri Oct 21 2011 Justin M. Forbes <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.15.1-1
- Require seabios-bin >= 0.6.0-2 (#741992)
- Replace init scripts with systemd units (#741920)
- Update to 0.15.1 stable upstream
* Fri Oct 21 2011 Paul Moore <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- Enable full relro and PIE (rhbz #738812)
* Wed Oct 12 2011 Daniel P. Berrange <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.15.0-6
- Add BR on ceph-devel to enable RBD block device
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #772075 - CVE-2012-0029 qemu: e1000: process_tx_desc legacy mode
packets heap overflow
https://bugzilla.redhat.com/show_bug.cgi?id=772075
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8604
2012-05-29 21:36:42
--------------------------------------------------------------------------------
Name : qemu
Product : Fedora 15
Version : 0.14.0
Release : 9.fc15
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:
* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.
As QEMU requires no host kernel patches to run, it is safe and easy to use.
--------------------------------------------------------------------------------
Update Information:
* CVE-2011-1750 virtio-blk: heap buffer overflow (bz 698906, bz 698911)
* CVE-2011-2527 set groups properly for -runas (bz 720773, bz 720784)
* CVE-2012-0029 e1000 buffer overflow (bz 783984, bz 772075)
* virtio-blk: refuse SG_IO requests with scsi=off (bz 770135)
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 29 2012 Cole Robinson <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.14.0-9
- CVE-2011-1750 virtio-blk: heap buffer overflow (bz 698906, bz 698911)
- CVE-2011-2527 set groups properly for -runas (bz 720773, bz 720784)
- CVE-2012-0029 e1000 buffer overflow (bz 783984, bz 772075)
- virtio-blk: refuse SG_IO requests with scsi=off (bz 770135)
* Wed Jun 22 2011 Richard W.M. Jones <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2:0.14.0-8
- Add BR libattr-devel. This caused the -fstype option to be disabled.
https://www.redhat.com/archives/libvir-list/2011-June/thread.html#01017
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #698906 - CVE-2011-1750 virtio-blk: heap buffer overflow caused by
unaligned requests
https://bugzilla.redhat.com/show_bug.cgi?id=698906
[ 2 ] Bug #720773 - CVE-2011-2527 qemu: when started as root, extra groups are
not dropped correctly
https://bugzilla.redhat.com/show_bug.cgi?id=720773
[ 3 ] Bug #772075 - CVE-2012-0029 qemu: e1000: process_tx_desc legacy mode
packets heap overflow
https://bugzilla.redhat.com/show_bug.cgi?id=772075
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke