Articles / Debian: Security update for…

Debian: Security update for Xen Qemu

Multiple vulnerabilities have been discovered in the Xen Qemu Device Model virtual machine hardware emulator. The device model for HVM domains does not properly handle VT100 escape sequences when emulating certain devices with a virtual console backend. An attacker within a guest with access to the vulnerable virtual console could overwrite memory of the device model and escalate privileges to that of the device model process. The qemu monitor was enabled by default, allowing administrators of a guest to access resources of the host, possibly escalate privileges or access resources belonging to another guest.

Updated packages are available from security.debian.org.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2543-1                   security@debian.org
http://www.debian.org/security/                          Raphael Geissert
September 08, 2012                     http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen-qemu-dm-4.0
Vulnerability  : multiple
Problem type   : local
Debian-specific: no
CVE ID         : CVE-2012-3515 CVE-2012-4411

Multiple vulnerabilities have been discovered in xen-qemu-dm-4.0, the Xen
Qemu Device Model virtual machine hardware emulator. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2012-3515:

   The device model for HVM domains does not properly handle VT100
   escape sequences when emulating certain devices with a virtual
   console backend. An attacker within a guest with access to the
   vulnerable virtual console could overwrite memory of the device
   model and escalate privileges to that of the device model process.

CVE-2012-4411:

   The qemu monitor was enabled by default, allowing administrators of
   a guest to access resources of the host, possibly escalate privileges
   or access resources belonging to another guest.

For the stable distribution (squeeze), these problems have been fixed in
version 4.0.1-2+squeeze2.

The testing distribution (wheezy), and the unstable distribution (sid),
no longer contain this package.

We recommend that you upgrade your xen-qemu-dm-4.0 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlBLuWQACgkQYy49rUbZzlrnFgCfS1OolPRVP1ZH4hs2on5j5OIJ
CeoAnjyB0qJ4TgWhji2RIP+vAJ4NlXaT
=pccG
-----END PGP SIGNATURE-----
Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.