Home / mailings [USN-2745-1] QEMU vulnerabilities
Posted on 24 September 2015
Ubuntu Security==========================
==========================
========================
Ubuntu Security Notice USN-2745-1
September 24, 2015
qemu, qemu-kvm vulnerabilities
==========================
==========================
========================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description:
- qemu: Machine emulator and virtualizer
- qemu-kvm: Machine emulator and virtualizer
Details:
Lian Yihan discovered that QEMU incorrectly handled certain payload
messages in the VNC display driver. A malicious guest could use this issu=
e
to cause the QEMU process to hang, resulting in a denial of service. This=
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-5239=
)
Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause the QEMU process to hang, resulting in a denial of service=
=2E
(CVE-2015-5278)
Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause a denial of service, or possibly execute arbitrary code on=
the host as the user running the QEMU process. In the default installatio=
n,
when QEMU is used with libvirt, attackers would be isolated by the libvir=
t
AppArmor profile. (CVE-2015-5279)
Qinghao Tang discovered that QEMU incorrectly handled transmit descriptor=
data when sending network packets. A malicious guest could use this issue=
to cause the QEMU process to hang, resulting in a denial of service.
(CVE-2015-6815)
Qinghao Tang discovered that QEMU incorrectly handled ATAPI command
permissions. A malicious guest could use this issue to cause the QEMU
process to crash, resulting in a denial of service. (CVE-2015-6855)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
qemu-system 1:2.2+dfsg-5expubuntu9.5
qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.5
qemu-system-arm 1:2.2+dfsg-5expubuntu9.5
qemu-system-mips 1:2.2+dfsg-5expubuntu9.5
qemu-system-misc 1:2.2+dfsg-5expubuntu9.5
qemu-system-ppc 1:2.2+dfsg-5expubuntu9.5
qemu-system-sparc 1:2.2+dfsg-5expubuntu9.5
qemu-system-x86 1:2.2+dfsg-5expubuntu9.5
Ubuntu 14.04 LTS:
qemu-system 2.0.0+dfsg-2ubuntu1.19
qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.19
qemu-system-arm 2.0.0+dfsg-2ubuntu1.19
qemu-system-mips 2.0.0+dfsg-2ubuntu1.19
qemu-system-misc 2.0.0+dfsg-2ubuntu1.19
qemu-system-ppc 2.0.0+dfsg-2ubuntu1.19
qemu-system-sparc 2.0.0+dfsg-2ubuntu1.19
qemu-system-x86 2.0.0+dfsg-2ubuntu1.19
Ubuntu 12.04 LTS:
qemu-kvm 1.0+noroms-0ubuntu14.25
After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2745-1
CVE-2015-5239, CVE-2015-5278, CVE-2015-5279, CVE-2015-6815,
CVE-2015-6855
Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:2.2+dfsg-5expubuntu9.5
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.19
https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.25