Ubuntu Security Notice 1692-1 - It was discovered that QEMU incorrectly handled certain e1000 packet sizes. In certain environments, an attacker may use this flaw in combination with large packets to cause a denial of service or execute arbitrary code in the guest.
8f41cb5967f46e89cb5e11c2d7d0ee866691b393d0205ae5a844327a2cef2d94
============================================================================
Ubuntu Security Notice USN-1692-1
January 16, 2013
qemu-kvm vulnerability
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
QEMU could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
- qemu-kvm: Machine emulator and virtualizer
Details:
It was discovered that QEMU incorrectly handled certain e1000 packet sizes.
In certain environments, an attacker may use this flaw in combination with
large packets to cause a denial of service or execute arbitrary code in the
guest.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
qemu-kvm 1.2.0+noroms-0ubuntu2.12.10.2
Ubuntu 12.04 LTS:
qemu-kvm 1.0+noroms-0ubuntu14.7
Ubuntu 11.10:
qemu-kvm 0.14.1+noroms-0ubuntu6.6
Ubuntu 10.04 LTS:
qemu-kvm 0.12.3+noroms-0ubuntu9.21
After a standard system update you need to restart your virtual machines to
make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1692-1
CVE-2012-6075
Package Information:
https://launchpad.net/ubuntu/+source/qemu-kvm/1.2.0+noroms-0ubuntu2.12.10.2
https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.7
https://launchpad.net/ubuntu/+source/qemu-kvm/0.14.1+noroms-0ubuntu6.6
https://launchpad.net/ubuntu/+source/qemu-kvm/0.12.3+noroms-0ubuntu9.21