Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 5983-1] qemu security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 5983-1] qemu security update


Chronologisch Thread  
  • From: Moritz Muehlenhoff <jmm AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 5983-1] qemu security update
  • Date: Fri, 22 Aug 2025 18:42:41 +0000
  • Authentication-results: lists.piratenpartei.de; dkim=none; spf=none (lists.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
  • List-archive: https://lists.debian.org/msgid-search/aKi6IWVX2uIlGKnw AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=k9YsZKb5FX081jilpyo96Maw4S8BHPDWM38UChXKU9g=; b=sb BlYr2kyxW8K9p8bhxtUJAQ7bRfUNMp4pJt3ic9+AliXVDnbgP8C6d3zkyo4Qyc1tYGe+WuwkapHYm 4KxirdIyiCMaOVFElUVZG2T9dDdDc5oYq32RlP2Dxm66lRO0RRbshi5uvLuP6ZK2JYwYsoSAFDmdb qKus6D+6m1i7KWc9qSDVaSgr3VWWPAKRTiQgbem3mLqctRdB4enZuzKyby+wqB26ex0Z04XQVQ4j7 n7eYghWq0B/Irxh/KPTh/pmPWid1kPuGWc8vK2G49ZshWryrbEw9MM1oXVBQ4mI7zTtRPk53N0Bax g/DRzhfKMJakg4qYzyu243MrogKGDn+w==;
  • Old-return-path: <jmm AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Fri, 22 Aug 2025 18:43:07 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <ZNQtCif9XeL.A.uvXG.7oLqoB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5983-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 22, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : qemu
CVE ID : CVE-2025-54566 CVE-2025-54567

This update removes the usage of the C (Credential) flag for the
binfmt_misc registration within the qemu-user package, as it allowed for
privilege escalation when running a suid/sgid binary under qemu-user.
This means suid/sgid foreign-architecture binaries are not running with
elevated privileges under qemu-user anymore. If you relied on this
behavior of qemu-user in the past (running suid/sgid foreign-arch
binaries), this will require changes to your deployment.

In Bookworm the affected packages are qemu-user-static (and
qemu-user-binfmt) instead of qemu-user.

Additionally, two security issues were fixed the in SR-IOV support
of QEMU system emulation.

For the oldstable distribution (bookworm), these problems have been fixed
in version 1:7.2+dfsg-7+deb12u15.

For the stable distribution (trixie), these problems have been fixed in
version 1:10.0.2+ds-2+deb13u1.

We recommend that you upgrade your qemu packages.

For the detailed security status of qemu please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qemu

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmiouaUACgkQEMKTtsN8
TjYzfRAAvDaO3Ia2zPie5VU7oYK9KfUb9muqXLyQQNW62sEnHz8s6mp8VqdEOB+Q
7BtOKJxZwt4VbnMUr0uDY5o5AHjYywbiPQzamD2gL+tpURUOb5A7QEOZYz7p3sdC
74ggfx39wiaFrqMSv7b1VJWdwAxnRdDRFdj54PqFNVSfi5NQOCfv99FEvHdhqEct
Lc2fUwlsA9obm+J0gvRpQ04mVuT1go4NALtroUGy9NgeFJkZcbu4h7EnhvT3Q6uf
I2z7Nee+oqbnr8Cuj5tSysJF+JqmjQLdwnBHhR/y1sRMRNeCV2L9vxyMmEqGPI18
/Vm0SG05DvqDKexG5Zyf7Rc3lwP1NZFljH7amzIPnioTy91ZB5TpECsp2NKsPNmc
+ERIAMH+2kZk7Jasm7r1MosW1fQH976PllKqu6yACHFHHWnQR7aC+YdcNMDlNThp
lLeTwK/M1kjhBv/BdLlPPFGDJalaaP9vDk7qsscyDQVohHyqIFBTxJkN/qqfrc12
BA/lDMdlKuU5KTNCpJmk8WGQpLllnjDqepJaG8c+WSie48tg0B1/r03xPt3y0KDY
2lAadQhQ15h7kjrfnvd/ZXaSVkcF2zdCcwZbElCfmgh7Jlm3Gd2BQQNV03Us9XFK
/5C8FSuUulETHiFROuLiwe8TjxQ8e6bvvW5xV5Xhnlc+VT2G2go=
=s2Hd
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 5983-1] qemu security update, Moritz Muehlenhoff, 22.08.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang