USN-1522-1: QEMU vulnerability

Publication date

2 August 2012

Overview

QEMU could be made to overwrite files as the administrator, or expose sensitive information.


Packages

  • qemu-kvm - Machine emulator and virtualizer

Details

It was discovered that QEMU incorrectly handled temporary files when
creating a snapshot. A local attacker could use this flaw to possibly
overwrite files with root privilege, or obtain sensitive information from
the guest.

It was discovered that QEMU incorrectly handled temporary files when
creating a snapshot. A local attacker could use this flaw to possibly
overwrite files with root privilege, or obtain sensitive information from
the guest.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
12.04 precise qemu-kvm –  1.0+noroms-0ubuntu14.1
11.10 oneiric qemu-kvm –  0.14.1+noroms-0ubuntu6.4
11.04 natty qemu-kvm –  0.14.0+noroms-0ubuntu4.6
10.04 lucid qemu-kvm –  0.12.3+noroms-0ubuntu9.19

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›