Debian Security Advisory
DSA-1799-1 qemu -- several vulnerabilities
- Date Reported:
- 11 May 2009
- Affected Packages:
- qemu
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2008-0928, CVE-2008-4539, CVE-2008-1945.
- More information:
-
Several vulnerabilities have been discovered in the QEMU processor emulator. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2008-0928
Ian Jackson discovered that range checks of file operations on emulated disk devices were insufficiently enforced.
- CVE-2008-1945
It was discovered that an error in the format auto detection of removable media could lead to the disclosure of files in the host system.
- CVE-2008-4539
A buffer overflow has been found in the emulation of the Cirrus graphics adaptor.
For the old stable distribution (etch), these problems have been fixed in version 0.8.2-4etch3.
For the stable distribution (lenny), these problems have been fixed in version 0.9.1-10lenny1.
For the unstable distribution (sid), these problems have been fixed in version 0.9.1+svn20081101-1.
We recommend that you upgrade your qemu packages.
- CVE-2008-0928
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3.diff.gz
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3.dsc
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3.dsc
- AMD64:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3_amd64.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3_i386.deb
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1.orig.tar.gz
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1.diff.gz
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1.dsc
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1.diff.gz
- AMD64:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_amd64.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_i386.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_powerpc.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.