CVE-2014-3689

NameCVE-2014-3689
DescriptionThe vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3066-1, DSA-3067-1
NVD severityhigh
Debian Bugs765496

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)jessie1:2.1+dfsg-12+deb8u6fixed
jessie (security)1:2.1+dfsg-12+deb8u12fixed
stretch (security), stretch1:2.8+dfsg-6+deb9u8fixed
buster1:3.1+dfsg-8+deb10u2fixed
buster (security)1:3.1+dfsg-8+deb10u3fixed
bullseye1:4.1-3fixed
sid1:4.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusource(unstable)2.1+dfsg-6765496
qemusourcesqueeze(unfixed)end-of-life
qemusourcewheezy1.1.2+dfsg-6a+deb7u5DSA-3066-1
qemu-kvmsource(unstable)(unfixed)
qemu-kvmsourcesqueeze(unfixed)end-of-life
qemu-kvmsourcewheezy1.1.2+dfsg-6+deb7u5DSA-3067-1

Notes

Upstream's quick and easy stopgap for this issue: compile out the hardware acceleration functions which lack sanity checks.
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=83afa38eb20ca27e30683edc7729880e091387fc

Search for package or bug name: Reporting problems