Debian Project

Debian testing security team - Advisory

DTSA-38-1

Date Reported:
May 26th, 2007
Affected Package:
qemu
Vulnerability:
several vulnerabilities
Problem-Scope:
local
Debian-specific:
No
CVE:
CVE-2007-1320 CVE-2007-1321 CVE-2007-1322 CVE-2007-1323 CVE-2007-1366

More information:
Several vulnerabilities have been discovered in the QEMU processor 
emulator, which may lead to the execution of arbitrary code or denial of 
service. The Common Vulnerabilities and Exposures project identifies the 
following problems: 
 
CVE-2007-1320 
Tavis Ormandy discovered that a memory management routine of the Cirrus 
video driver performs insufficient bounds checking, which might 
allow the execution of arbitrary code through a heap overflow. 
 
CVE-2007-1321 
Tavis Ormandy discovered that the NE2000 network driver and the socket 
code perform insufficient input validation, which might allow the 
execution of arbitrary code through a heap overflow. 
 
CVE-2007-1322 
Tavis Ormandy discovered that the "icebp" instruction can be abused to 
terminate the emulation, resulting in denial of service. 
 
CVE-2007-1323 
Tavis Ormandy discovered that the NE2000 network driver and the socket 
code perform insufficient input validation, which might allow the 
execution of arbitrary code through a heap overflow. 
 
CVE-2007-1366 
Tavis Ormandy discovered that the "aam" instruction can be abused to 
crash qemu through a division by zero, resulting in denial of 
service. 

For the testing distribution (lenny) this is fixed in version 0.8.2-5lenny1
For the unstable distribution (sid) this is fixed in version 0.9.0-2

This upgrade is recommended if you use qemu.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
apt-get update && apt-get upgrade


To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free


Valid HTML 4.01! Valid CSS!