Mageia Bugzilla – Bug 9871
qemu new security issue CVE-2013-1922
Last modified: 2013-05-02 19:32:27 CEST
Fedora has issued an advisory on April 21:
Mageia 2 is also affected.
Patch checked into SVN for Mageia 2 and Cauldron.
Currently testing a Cauldron build locally before asking for a freeze push.
Will submit the Mageia 2 build once it's available in Cauldron.
Steps to Reproduce:
Patched packages uploaded for Mageia 2 and Cauldron.
Updated qemu packages fix security vulnerability:
A security flaw was found in the way qemu-nbd, the QEMU Disk Network Block
Device server tool of QEMU, performed detection of image formats (the image
format has been previously autodetected). A guest operating system
administrator could write a header to particular raw disk image format,
describing another format than original one for that disk image, leading to
scenario in which after restart of that guest, QEMU would detect new format
of the image, and could allow the guest to read any file on the host if QEMU
was sufficiently privileged (CVE-2013-1922).
Updated packages in core/updates_testing:
Testing complete mga2 64
IIUC We don't have nbd-client in mga2 so although we can serve the image there is nothing to connect it with. eg. http://blogs.gnome.org/muelli/2010/03/mounting-qemu-qcow2-image-using-nbd/
$ qemu-nbd -p 1024 mageia.qcow2 &
# netstat -pant | grep 1024
tcp 0 0 0.0.0.0:1024 0.0.0.0:* LISTEN 16727/qemu-nbd
All other tests ok.
Testing mga2 32
Testing complete mga2 32
Advisory & SRPM in comment 1
Could sysadmin please push from core/updates_testing to core/updates