You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa qemu

Sigurnosni nedostatak programskog paketa qemu

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4511-1
September 17, 2020

qemu vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

QEMU could be made to crash or run programs.

Software Description:
– qemu: Machine emulator and virtualizer

Details:

Ziming Zhang, Xiao Wei, Gonglei Arei, and Yanyu Zhang discovered that QEMU
incorrectly handled certain USB packets. An attacker inside the guest could
use this issue to cause QEMU to crash, resulting in a denial of service, or
possibly execute arbitrary code on the host. In the default installation,
when QEMU is used with libvirt, attackers would be isolated by the libvirt
AppArmor profile.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
qemu 1:4.2-3ubuntu6.6
qemu-system 1:4.2-3ubuntu6.6
qemu-system-arm 1:4.2-3ubuntu6.6
qemu-system-mips 1:4.2-3ubuntu6.6
qemu-system-ppc 1:4.2-3ubuntu6.6
qemu-system-s390x 1:4.2-3ubuntu6.6
qemu-system-sparc 1:4.2-3ubuntu6.6
qemu-system-x86 1:4.2-3ubuntu6.6
qemu-system-x86-microvm 1:4.2-3ubuntu6.6
qemu-system-x86-xen 1:4.2-3ubuntu6.6

Ubuntu 18.04 LTS:
qemu 1:2.11+dfsg-1ubuntu7.32
qemu-system 1:2.11+dfsg-1ubuntu7.32
qemu-system-arm 1:2.11+dfsg-1ubuntu7.32
qemu-system-mips 1:2.11+dfsg-1ubuntu7.32
qemu-system-ppc 1:2.11+dfsg-1ubuntu7.32
qemu-system-s390x 1:2.11+dfsg-1ubuntu7.32
qemu-system-sparc 1:2.11+dfsg-1ubuntu7.32
qemu-system-x86 1:2.11+dfsg-1ubuntu7.32

Ubuntu 16.04 LTS:
qemu 1:2.5+dfsg-5ubuntu10.46
qemu-block-extra 1:2.5+dfsg-5ubuntu10.46
qemu-guest-agent 1:2.5+dfsg-5ubuntu10.46
qemu-kvm 1:2.5+dfsg-5ubuntu10.46
qemu-system 1:2.5+dfsg-5ubuntu10.46
qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.46
qemu-system-arm 1:2.5+dfsg-5ubuntu10.46
qemu-system-common 1:2.5+dfsg-5ubuntu10.46
qemu-system-mips 1:2.5+dfsg-5ubuntu10.46
qemu-system-misc 1:2.5+dfsg-5ubuntu10.46
qemu-system-ppc 1:2.5+dfsg-5ubuntu10.46
qemu-system-s390x 1:2.5+dfsg-5ubuntu10.46
qemu-system-sparc 1:2.5+dfsg-5ubuntu10.46
qemu-system-x86 1:2.5+dfsg-5ubuntu10.46
qemu-user 1:2.5+dfsg-5ubuntu10.46
qemu-user-binfmt 1:2.5+dfsg-5ubuntu10.46
qemu-user-static 1:2.5+dfsg-5ubuntu10.46
qemu-utils 1:2.5+dfsg-5ubuntu10.46

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://usn.ubuntu.com/4511-1
CVE-2020-14364

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.6
https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.32
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.46

—–BEGIN PGP SIGNATURE—–
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=ZcUT
—–END PGP SIGNATURE—–

AutorBruno Varga
Cert idNCERT-REF-2020-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci jezgre operacijskog sustava iOS i iPadOS. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja, izvršavanje proizvoljnog...

Close