| Summary: | qemu new security issue CVE-2013-4344 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, tmb |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/570339/ | ||
| Whiteboard: | MGA2TOO advisory MGA3-64-OK MGA3-32-OK MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | qemu-1.2.0-8.2.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-10-10 04:38:50 CEST
David Walser
2013-10-10 04:38:59 CEST
Whiteboard:
(none) =>
MGA2TOO Fedora has issued an advisory for this on October 8: https://lists.fedoraproject.org/pipermail/package-announce/2013-October/119033.html URL:
(none) =>
http://lwn.net/Vulnerabilities/570339/ RedHat has issued an advisory for this today (November 21): https://rhn.redhat.com/errata/RHSA-2013-1553.html Patched packages uploaded for Mageia 2 and Mageia 3. Please note that this is a high-severity security issue :o) Advisory: ======================== Updated qemu packages fix security vulnerability: A buffer overflow flaw was found in the way QEMU processed the SCSI "REPORT LUNS" command when more than 256 LUNs were specified for a single SCSI target. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process (CVE-2013-4344). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344 https://rhn.redhat.com/errata/RHSA-2013-1553.html ======================== Updated packages in core/updates_testing: ======================== qemu-1.0-6.6.mga2 qemu-img-1.0-6.6.mga2 qemu-1.2.0-8.3.mga3 qemu-img-1.2.0-8.3.mga3 from SRPMS: qemu-1.0-6.6.mga2.src.rpm qemu-1.2.0-8.3.mga3.src.rpm Assignee:
bugsquad =>
qa-bugs
Dave Hodgins
2013-11-21 20:54:59 CET
CC:
(none) =>
davidwhodgins Testing complete using virt-manager, on Mageia 2 and 3, i586 and x86_64. Could someone from the sysadmin team push 11422.adv to updates. Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2013-0341.html Status:
NEW =>
RESOLVED |