Home / mailingsPDF  

[USN-2745-1] QEMU vulnerabilities

Posted on 24 September 2015
Ubuntu Security

==========================
==========================
========================
Ubuntu Security Notice USN-2745-1
September 24, 2015

qemu, qemu-kvm vulnerabilities
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
- qemu: Machine emulator and virtualizer
- qemu-kvm: Machine emulator and virtualizer

Details:

Lian Yihan discovered that QEMU incorrectly handled certain payload
messages in the VNC display driver. A malicious guest could use this issu=
e
to cause the QEMU process to hang, resulting in a denial of service. This=

issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-5239=
)

Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause the QEMU process to hang, resulting in a denial of service=
=2E
(CVE-2015-5278)

Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause a denial of service, or possibly execute arbitrary code on=

the host as the user running the QEMU process. In the default installatio=
n,
when QEMU is used with libvirt, attackers would be isolated by the libvir=
t
AppArmor profile. (CVE-2015-5279)

Qinghao Tang discovered that QEMU incorrectly handled transmit descriptor=

data when sending network packets. A malicious guest could use this issue=

to cause the QEMU process to hang, resulting in a denial of service.
(CVE-2015-6815)

Qinghao Tang discovered that QEMU incorrectly handled ATAPI command
permissions. A malicious guest could use this issue to cause the QEMU
process to crash, resulting in a denial of service. (CVE-2015-6855)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
qemu-system 1:2.2+dfsg-5expubuntu9.5
qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.5
qemu-system-arm 1:2.2+dfsg-5expubuntu9.5
qemu-system-mips 1:2.2+dfsg-5expubuntu9.5
qemu-system-misc 1:2.2+dfsg-5expubuntu9.5
qemu-system-ppc 1:2.2+dfsg-5expubuntu9.5
qemu-system-sparc 1:2.2+dfsg-5expubuntu9.5
qemu-system-x86 1:2.2+dfsg-5expubuntu9.5

Ubuntu 14.04 LTS:
qemu-system 2.0.0+dfsg-2ubuntu1.19
qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.19
qemu-system-arm 2.0.0+dfsg-2ubuntu1.19
qemu-system-mips 2.0.0+dfsg-2ubuntu1.19
qemu-system-misc 2.0.0+dfsg-2ubuntu1.19
qemu-system-ppc 2.0.0+dfsg-2ubuntu1.19
qemu-system-sparc 2.0.0+dfsg-2ubuntu1.19
qemu-system-x86 2.0.0+dfsg-2ubuntu1.19

Ubuntu 12.04 LTS:
qemu-kvm 1.0+noroms-0ubuntu14.25

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2745-1
CVE-2015-5239, CVE-2015-5278, CVE-2015-5279, CVE-2015-6815,
CVE-2015-6855

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:2.2+dfsg-5expubuntu9.5
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.19
https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.25

 

TOP