qemu-kvm-0.12.1.2-2.209.AXS4.4
エラータID: AXSA:2012-478:01
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware.
Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc.
Security issues fixed with this release:
• CVE-2011-2527
• CVE-2011-4111
No information available at the time of writing, see the CVE link below.
• CVE-2012-0029
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
• No information available at the time of writing, see the CVE link below.
Fixed bugs:
• qemu-kvm scsi option can be used along the device option. Previously, when set to "off", it did not disable the scsi feature but just hid the feature bit, allowing for malicious users to ignore the feature bit and issue a request. This scsi=off" option can be used to mitigate the virtualization aspect of CVE-2011-4127 before installing the kernel from <A HREF="http://www.asianux.com/tsn_hq/index.php?m=errata&a=detail&eid=2720&sType... AXSA:2012-228:02</A>. If it is already installed, you can skip changing the scsi option.Other wise run the guests by invoking /usr/libexec/qemu-kvm directly and use the "-global virtio-blk-pci.scsi=off" option to apply the mitigation.
Enhancement:
• qemu-kvm is now built with full RELRO and PIE support.
Update packages.
The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.
Buffer overflow in the ccid_card_vscard_handle_message function in hw/ccid-card-passthru.c in QEMU before 0.15.2 and 1.x before 1.0-rc4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VSC_ATR message.
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
N/A
SRPMS
- qemu-kvm-0.12.1.2-2.209.AXS4.4.src.rpm
MD5: 0d2c19a9b9feac9d42fd5e13b8e87d57
SHA-256: 32e4b6ab7cf5aea91847bb12018b24ddcbf970decb2b7957a27f81b2b0b991c8
Size: 6.92 MB
Asianux Server 4 for x86_64
- qemu-img-0.12.1.2-2.209.AXS4.4.x86_64.rpm
MD5: a5eb05b9aa42a0106c4321871a87191e
SHA-256: 33e78203f2fab791704d9bc356a019cc6ae50e54d4efe757a2b10e104a8d7023
Size: 337.22 kB - qemu-kvm-0.12.1.2-2.209.AXS4.4.x86_64.rpm
MD5: 2b78b93aab7689dfb765c6b569a18986
SHA-256: e119442ca827e27cc54974d8192cad096c3f0208de07850a866d203881289f11
Size: 1.15 MB - qemu-kvm-tools-0.12.1.2-2.209.AXS4.4.x86_64.rpm
MD5: 7db456c7737f55f86f94ad7ef087525d
SHA-256: 453eb7a39cfd3178f223757b8d6d4c4a4f3debffbf85312bf6cdbb820e61e5e0
Size: 178.71 kB