-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3066-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 06, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : qemu CVE ID : CVE-2014-3689 CVE-2014-7815 Debian Bug : 765496 Several vulnerabilities were discovered in qemu, a fast processor emulator. CVE-2014-3689 The Advanced Threat Research team at Intel Security reported that guest provided parameter were insufficiently validated in rectangle functions in the vmware-vga driver. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process. CVE-2014-7815 James Spadaro of Cisco reported insufficiently sanitized bits_per_pixel from the client in the QEMU VNC display driver. An attacker having access to the guest's VNC console could use this flaw to crash the guest. For the stable distribution (wheezy), these problems have been fixed in version 1.1.2+dfsg-6a+deb7u5. For the unstable distribution (sid), these problems have been fixed in version 2.1+dfsg-7. We recommend that you upgrade your qemu packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJUW5mJAAoJEAVMuPMTQ89E/DIQAJqOXuS0rI8WE6zvcOpP8tvd mF1IhtM48Gkyj8JZOXrLqMAjFnJgqyQdRaMSOUAvCGkLGkWRyyKIazj+VOTsWQZW XCEI94yP1Cmxixstux2TNW0PnyR0NN2Wb2f7yHwajVEGJqvFK10BkwoE2OXNQ3kk 2tpjU6fHsRbFKfZjRA2JMssRLI2q2vef2ThmoSK61Pq7KHZNHr1Wo68556GCIe9D uvC+mfIJwzQIEoZkV06OvcNb7hRrZLyXkAJUm4y8IgUZCGo82CQGgc2MCtARmUnO TQSm8pD3qIm9THKbLnmvtxKJ2VT6F/0IsHknJeYJ68Lf/pt4bwfrBTW+TjUepnRm 1cAZtHLPmUAMMNvRAF+281tPb/JtJG8xrKSFa79uVcExRq/26rm7d9X7GtSZ4P3T 5tMZR1MFOM3QeuUQiaEE0ENPhL9yOsSsYItDcaiKUdHJdae351svVr/lsnww6GPL qhWv4GVeNgmxeFD8xDL/hYsz2/aKTdvcQdrtEz0cX2sI85yeSAM41/c2kUb5GPVw cfSZw0iRihVjlDEU9Lpk4mYoXbvvI0vyygR+UzViIHZ/zywA4R9CU71fAgNu5Tv9 0867n6rOYDZxtaiDM6AmQCLp809Iig6AMIi3BzTqMMJC3HDyQEPA9KKqKi1ZsNk9 udI9OM1ja6CuwyCBr4Hs =KqAr -----END PGP SIGNATURE-----