Fedora has issued an advisory on May 29: http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html Patched package for Mageia 1 uploaded. Advisory: ======================== Updated qemu packages fix security vulnerabilities: The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host (CVE-2011-2527). Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets (CVE-2012-0029). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029 http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html ======================== Updated packages in core/updates_testing: ======================== qemu-0.14.0-5.2.mga1 qemu-img-0.14.0-5.2.mga1 from qemu-0.14.0-5.2.mga1.src.rpm
No poc that I could see. I'll test Mageia 1 x86-64 shortly using the procedure from https://bugs.mageia.org/show_bug.cgi?id=6694#c3
CC: (none) => davidwhodginsWhiteboard: (none) => has_procedure
Testing complete on Mageia 1 x86-64. I'll test Mageia 1 i586 shortly.
Whiteboard: has_procedure => has_procedure MGA1-64-OK
Testing on Mageia 1 i586 complete. Could someone from the sysadmin team push the srpm qemu-0.14.0-5.2.mga1.src.rpm from Mageia 1 Core Updates Testing to Core Updates. Advisory: Updated qemu packages fix security vulnerabilities: The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host (CVE-2011-2527). Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets (CVE-2012-0029). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029 http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html https://bugs.mageia.org/show_bug.cgi?id=7006
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsWhiteboard: has_procedure MGA1-64-OK => has_procedure MGA1-64-OK MGA1-32-OK
Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0222
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED