Package: qemu, qemu-kvm Version: 1.1.2+dfsg-6 Severity: grave Tags: security patch upstream
Several flaws were found in guest image format processing in qemu. CVEs are as follows: parallels: Sanity check for s->tracks (CVE-2014-0142) parallels: Fix catalog size integer overflow (CVE-2014-0143) qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143) qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145) qcow2: Fix NULL dereference in qcow2_open() error path (CVE-2014-0146) block: Limit request size (CVE-2014-0143) dmg: prevent chunk buffer overflow (CVE-2014-0145) dmg: sanitize chunk length and sectorcount (CVE-2014-0145) qcow2: Fix new L1 table size check (CVE-2014-0143) qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143) qcow2: Don't rely on free_cluster_index in alloc_refcount_block() (CVE-2014-0147) qcow2: Validate active L1 table offset and size (CVE-2014-0144) qcow2: Validate snapshot table offset/size (CVE-2014-0144) qcow2: Check refcount table size (CVE-2014-0144) qcow2: Check backing_file_offset (CVE-2014-0144) qcow2: Check header_length (CVE-2014-0144) curl: check data size before memcpy to local buffer. (CVE-2014-0144) vhdx: Bounds checking for block_size and logical_sector_size (CVE-2014-0148) vdi: add bounds checks for blocks_in_image and disk_size header fields (CVE-2014-0144) vpc: Validate block size (CVE-2014-0142) vpc/vhd: add bounds check for max_table_entries and block_size (CVE-2014-0144) bochs: Check extent_size header field (CVE-2014-0142) bochs: Check catalog_size header field (CVE-2014-0143) bochs: Use unsigned variables for offsets and sizes (CVE-2014-0147) block/cloop: refuse images with bogus offsets (CVE-2014-0144) block/cloop: refuse images with huge offsets arrays (CVE-2014-0144) block/cloop: prevent offsets_size integer overflow (CVE-2014-0143) block/cloop: validate block_size header field (CVE-2014-0144) Upstream patches: https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html Some of those issues affects wheezy and even squeeze versions of qemu and qemu-kvm packages, and needs quite some backporting work. Thanks, /mjt -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org