Debian Security Advisory
DLA-765-1 qemu-kvm -- LTS security update
- Date Reported:
- 26 Dec 2016
- Affected Packages:
- qemu-kvm
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2016-9911, CVE-2016-9921, CVE-2016-9922.
- More information:
-
Multiple vulnerabilities have been found in qemu-kvm:
- CVE-2016-9911
qemu-kvm built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in
ehci_init_transfer
. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. - CVE-2016-9921 /
CVE-2016-9922
qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
For Debian 7
Wheezy
, these problems have been fixed in version 1.1.2+dfsg-6+deb7u19.We recommend that you upgrade your qemu-kvm packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2016-9911