It was discovered that QEMU incorrectly handled temporary files when creating a snapshot. A local attacker could use this flaw to possibly overwrite files with root privilege, or obtain sensitive information from the guest. Updated packages are available from security.ubuntu.com.
========================================================================== Ubuntu Security Notice USN-1522-1 August 02, 2012 qemu-kvm vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS Summary: QEMU could be made to overwrite files as the administrator, or expose sensitive information. Software Description: - qemu-kvm: Machine emulator and virtualizer Details: It was discovered that QEMU incorrectly handled temporary files when creating a snapshot. A local attacker could use this flaw to possibly overwrite files with root privilege, or obtain sensitive information from the guest. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: qemu-kvm 1.0+noroms-0ubuntu14.1 Ubuntu 11.10: qemu-kvm 0.14.1+noroms-0ubuntu6.4 Ubuntu 11.04: qemu-kvm 0.14.0+noroms-0ubuntu4.6 Ubuntu 10.04 LTS: qemu-kvm 0.12.3+noroms-0ubuntu9.19 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1522-1 CVE-2012-2652 Package Information: https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.1 https://launchpad.net/ubuntu/+source/qemu-kvm/0.14.1+noroms-0ubuntu6.4 https://launchpad.net/ubuntu/+source/qemu-kvm/0.14.0+noroms-0ubuntu4.6 https://launchpad.net/ubuntu/+source/qemu-kvm/0.12.3+noroms-0ubuntu9.19