| Summary: | qemu-kvm missing update for security issues CVE-2011-2527 and CVE-2012-0029 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, tmb |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/452825/ | ||
| Whiteboard: | has_procedure MGA1-64-OK MGA1-32-OK | ||
| Source RPM: | qemu-0.14.0-5.1.1.mga1.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-08-10 21:01:49 CEST
No poc that I could see. I'll test Mageia 1 x86-64 shortly using the procedure from https://bugs.mageia.org/show_bug.cgi?id=6694#c3 CC:
(none) =>
davidwhodgins Testing complete on Mageia 1 x86-64. I'll test Mageia 1 i586 shortly. Whiteboard:
has_procedure =>
has_procedure MGA1-64-OK Testing on Mageia 1 i586 complete. Could someone from the sysadmin team push the srpm qemu-0.14.0-5.2.mga1.src.rpm from Mageia 1 Core Updates Testing to Core Updates. Advisory: Updated qemu packages fix security vulnerabilities: The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host (CVE-2011-2527). Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets (CVE-2012-0029). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029 http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html https://bugs.mageia.org/show_bug.cgi?id=7006 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0222 Status:
NEW =>
RESOLVED |