• QEMU vulnerabilities

    From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, February 18, 2020 16:10:08
    qemu vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in QEMU.

    Software Description

    * qemu - Machine emulator and virtualizer

    Details

    Felipe Franciosi, Raphael Norwitz, and Peter Turschmid discovered
    that QEMU incorrectly handled iSCSI server responses. A remote
    attacker in control of the iSCSI server could use this issue to
    cause QEMU to crash, leading to a denial of service, or possibly
    execute arbitrary code. (CVE-2020-1711)

    It was discovered that the QEMU libslirp component incorrectly
    handled memory. A remote attacker could use this issue to cause
    QEMU to crash, resulting in a denial of service, or possibly
    execute arbitrary code. (CVE-2020-7039, CVE-2020-8608)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    qemu - 1:4.0+dfsg-0ubuntu9.4
    qemu-system - 1:4.0+dfsg-0ubuntu9.4
    qemu-system-arm - 1:4.0+dfsg-0ubuntu9.4
    qemu-system-mips - 1:4.0+dfsg-0ubuntu9.4
    qemu-system-ppc - 1:4.0+dfsg-0ubuntu9.4
    qemu-system-s390x - 1:4.0+dfsg-0ubuntu9.4
    qemu-system-sparc - 1:4.0+dfsg-0ubuntu9.4
    qemu-system-x86 - 1:4.0+dfsg-0ubuntu9.4

    Ubuntu 18.04 LTS
    qemu - 1:2.11+dfsg-1ubuntu7.23
    qemu-system - 1:2.11+dfsg-1ubuntu7.23
    qemu-system-arm - 1:2.11+dfsg-1ubuntu7.23
    qemu-system-mips - 1:2.11+dfsg-1ubuntu7.23
    qemu-system-ppc - 1:2.11+dfsg-1ubuntu7.23
    qemu-system-s390x - 1:2.11+dfsg-1ubuntu7.23
    qemu-system-sparc - 1:2.11+dfsg-1ubuntu7.23
    qemu-system-x86 - 1:2.11+dfsg-1ubuntu7.23

    Ubuntu 16.04 LTS
    qemu - 1:2.5+dfsg-5ubuntu10.43
    qemu-system - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-aarch64 - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-arm - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-mips - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-ppc - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-s390x - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-sparc - 1:2.5+dfsg-5ubuntu10.43
    qemu-system-x86 - 1:2.5+dfsg-5ubuntu10.43

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to restart all QEMU
    virtual machines to make all the necessary changes.

    References

    * CVE-2020-1711
    * CVE-2020-7039
    * CVE-2020-8608

    --- Mystic BBS v1.12 A44 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, August 19, 2020 16:10:05
    qemu vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in QEMU.

    Software Description

    * qemu - Machine emulator and virtualizer

    Details

    Ziming Zhang and VictorV discovered that the QEMU SLiRP networking
    implementation incorrectly handled replying to certain ICMP echo
    requests. An attacker inside a guest could possibly use this issue
    to leak host memory to obtain sensitive information. This issue
    only affected Ubuntu 18.04 LTS. (CVE-2020-10756)

    Eric Blake and Xueqiang Wei discovered that the QEMU NDB
    implementation incorrectly handled certain requests. A remote
    attacker could possibly use this issue to cause QEMU to crash,
    resulting in a denial of service. This issue only affected Ubuntu
    20.04 LTS. (CVE-2020-10761)

    Ziming Zhang discovered that the QEMU SM501 graphics driver
    incorrectly handled certain operations. An attacker inside a guest
    could use this issue to cause QEMU to crash, resulting in a denial
    of service, or possibly execute arbitrary code. (CVE-2020-12829)

    It was discovered that the QEMU SD memory card implementation
    incorrectly handled certain memory operations. An attacker inside
    a guest could possibly use this issue to cause QEMU to crash,
    resulting in a denial of service. (CVE-2020-13253)

    Ren Ding and Hanqing Zhao discovered that the QEMU ES1370 audio
    driver incorrectly handled certain invalid frame counts. An
    attacker inside a guest could possibly use this issue to cause
    QEMU to crash, resulting in a denial of service. (CVE-2020-13361)

    Ren Ding and Hanqing Zhao discovered that the QEMU MegaRAID SAS
    SCSI driver incorrectly handled certain memory operations. An
    attacker inside a guest could possibly use this issue to cause
    QEMU to crash, resulting in a denial of service. (CVE-2020-13362)

    Alexander Bulekov discovered that QEMU MegaRAID SAS SCSI driver
    incorrectly handled certain memory space operations. An attacker
    inside a guest could possibly use this issue to cause QEMU to
    crash, resulting in a denial of service. (CVE-2020-13659)

    Ren Ding, Hanqing Zhao, Alexander Bulekov, and Anatoly Trosinenko
    discovered that the QEMU incorrectly handled certain msi-x mmio
    operations. An attacker inside a guest could possibly use this
    issue to cause QEMU to crash, resulting in a denial of service.
    (CVE-2020-13754)

    It was discovered that QEMU incorrectly handled certain memory
    copy operations when loading ROM contents. If a user were tricked
    into running an untrusted kernel image, a remote attacker could
    possibly use this issue to run arbitrary code. This issue only
    affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-13765)

    Ren Ding, Hanqing Zhao, and Yi Ren discovered that the QEMU ATI
    video driver incorrectly handled certain index values. An attacker
    inside a guest could possibly use this issue to cause QEMU to
    crash, resulting in a denial of service. This issue only affected
    Ubuntu 20.04 LTS. (CVE-2020-13800)

    Ziming Zhang discovered that the QEMU OSS audio driver incorrectly
    handled certain operations. An attacker inside a guest could
    possibly use this issue to cause QEMU to crash, resulting in a
    denial of service. This issue only affected Ubuntu 20.04 LTS.
    (CVE-2020-14415)

    Ziming Zhang discovered that the QEMU XGMAC Ethernet controller
    incorrectly handled packet transmission. An attacker inside a
    guest could use this issue to cause QEMU to crash, resulting in a
    denial of service, or possibly execute arbitrary code.
    (CVE-2020-15863)

    Ziming Zhang discovered that the QEMU e1000e Ethernet controller
    incorrectly handled packet processing. An attacker inside a guest
    could possibly use this issue to cause QEMU to crash, resulting in
    a denial of service. This issue only affected Ubuntu 18.04 LTS and
    Ubuntu 20.04 LTS. (CVE-2020-16092)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    qemu - 1:4.2-3ubuntu6.4
    qemu-system - 1:4.2-3ubuntu6.4
    qemu-system-arm - 1:4.2-3ubuntu6.4
    qemu-system-mips - 1:4.2-3ubuntu6.4
    qemu-system-ppc - 1:4.2-3ubuntu6.4
    qemu-system-s390x - 1:4.2-3ubuntu6.4
    qemu-system-sparc - 1:4.2-3ubuntu6.4
    qemu-system-x86 - 1:4.2-3ubuntu6.4
    qemu-system-x86-microvm - 1:4.2-3ubuntu6.4
    qemu-system-x86-xen - 1:4.2-3ubuntu6.4

    Ubuntu 18.04 LTS
    qemu - 1:2.11+dfsg-1ubuntu7.31
    qemu-system - 1:2.11+dfsg-1ubuntu7.31
    qemu-system-mips - 1:2.11+dfsg-1ubuntu7.31
    qemu-system-ppc - 1:2.11+dfsg-1ubuntu7.31
    qemu-system-s390x - 1:2.11+dfsg-1ubuntu7.31
    qemu-system-sparc - 1:2.11+dfsg-1ubuntu7.31
    qemu-system-x86 - 1:2.11+dfsg-1ubuntu7.31

    Ubuntu 16.04 LTS
    qemu - 1:2.5+dfsg-5ubuntu10.45
    qemu-system - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-aarch64 - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-arm - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-mips - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-ppc - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-s390x - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-sparc - 1:2.5+dfsg-5ubuntu10.45
    qemu-system-x86 - 1:2.5+dfsg-5ubuntu10.45

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to restart all QEMU
    virtual machines to make all the necessary changes.

    References

    * CVE-2020-10756
    * CVE-2020-10761
    * CVE-2020-12829
    * CVE-2020-13253
    * CVE-2020-13361
    * CVE-2020-13362
    * CVE-2020-13659
    * CVE-2020-13754
    * CVE-2020-13765
    * CVE-2020-13800
    * CVE-2020-14415
    * CVE-2020-15863
    * CVE-2020-16092

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)