You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa QEMU

Sigurnosni nedostaci programskog paketa QEMU

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4650-1
November 30, 2020

qemu vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.10
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
– qemu: Machine emulator and virtualizer

Details:

Alexander Bulekov discovered that QEMU incorrectly handled SDHCI device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code on the host. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2020-17380)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled USB device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25084)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled SDHCI device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25085)

Gaoning Pan, Yongkang Jia, and Yi Ren discovered that QEMU incorrectly
handled USB device emulation. An attacker inside the guest could use this
issue to cause QEMU to crash, resulting in a denial of service.
(CVE-2020-25624)

It was discovered that QEMU incorrectly handled USB device emulation. An
attacker inside the guest could use this issue to cause QEMU to hang,
resulting in a denial of service. (CVE-2020-25625)

Cheolwoo Myung discovered that QEMU incorrectly handled USB device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. (CVE-2020-25723)

Gaoning Pan discovered that QEMU incorrectly handled ATI graphics device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 20.10. (CVE-2020-27616)

Gaoning Pan discovered that QEMU incorrectly handled networking. An
attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. (CVE-2020-27617)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
qemu-system 1:5.0-5ubuntu9.2
qemu-system-arm 1:5.0-5ubuntu9.2
qemu-system-mips 1:5.0-5ubuntu9.2
qemu-system-misc 1:5.0-5ubuntu9.2
qemu-system-ppc 1:5.0-5ubuntu9.2
qemu-system-s390x 1:5.0-5ubuntu9.2
qemu-system-sparc 1:5.0-5ubuntu9.2
qemu-system-x86 1:5.0-5ubuntu9.2
qemu-system-x86-microvm 1:5.0-5ubuntu9.2
qemu-system-x86-xen 1:5.0-5ubuntu9.2

Ubuntu 20.04 LTS:
qemu-system 1:4.2-3ubuntu6.10
qemu-system-arm 1:4.2-3ubuntu6.10
qemu-system-mips 1:4.2-3ubuntu6.10
qemu-system-misc 1:4.2-3ubuntu6.10
qemu-system-ppc 1:4.2-3ubuntu6.10
qemu-system-s390x 1:4.2-3ubuntu6.10
qemu-system-sparc 1:4.2-3ubuntu6.10
qemu-system-x86 1:4.2-3ubuntu6.10
qemu-system-x86-microvm 1:4.2-3ubuntu6.10
qemu-system-x86-xen 1:4.2-3ubuntu6.10

Ubuntu 18.04 LTS:
qemu-system 1:2.11+dfsg-1ubuntu7.34
qemu-system-arm 1:2.11+dfsg-1ubuntu7.34
qemu-system-mips 1:2.11+dfsg-1ubuntu7.34
qemu-system-misc 1:2.11+dfsg-1ubuntu7.34
qemu-system-ppc 1:2.11+dfsg-1ubuntu7.34
qemu-system-s390x 1:2.11+dfsg-1ubuntu7.34
qemu-system-sparc 1:2.11+dfsg-1ubuntu7.34
qemu-system-x86 1:2.11+dfsg-1ubuntu7.34

Ubuntu 16.04 LTS:
qemu-system 1:2.5+dfsg-5ubuntu10.48
qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.48
qemu-system-arm 1:2.5+dfsg-5ubuntu10.48
qemu-system-mips 1:2.5+dfsg-5ubuntu10.48
qemu-system-misc 1:2.5+dfsg-5ubuntu10.48
qemu-system-ppc 1:2.5+dfsg-5ubuntu10.48
qemu-system-s390x 1:2.5+dfsg-5ubuntu10.48
qemu-system-sparc 1:2.5+dfsg-5ubuntu10.48
qemu-system-x86 1:2.5+dfsg-5ubuntu10.48

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://usn.ubuntu.com/4650-1
CVE-2020-17380, CVE-2020-25084, CVE-2020-25085, CVE-2020-25624,
CVE-2020-25625, CVE-2020-25723, CVE-2020-27616, CVE-2020-27617

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:5.0-5ubuntu9.2
https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.10
https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.34
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.48

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl/E/osACgkQZWnYVadE
vpP2xA//UvSgGe3O1ALhtLNMqoHboPN5B4iYL7DN0MoqYYzsNny3iCpWiQ5yxs4p
syGS7seAYGTw7JtzoLoOwbe+esMiMJgQwKFe8fDJPhoqotR5L2PzqMEnY/qff3b4
f325M8jJZqndlwZDoIfDqetEqrEcs8Orto93ENdobp96cSNyLkbmOCf2kW7Us+4E
RJEmj41DYJrNGHaBrjgvGpEP6XVzPtGLMFD4z38/3LWzwB5wJ/xQW/Oo+Ac4lgPE
FS5TaS3IdOYcuVcNlP2qV5PYVlcFdY0+xFDxs0eTw09g3uJoSX27KHXb0KaoD7R8
kMcmqGxZRK0iLL/VDgse4ey7IsriBNV5VcEPmbZn1acwiV/PCLW2yfHJranvHTq5
rb7TLHSVzpnX9L0Qlm13WLKmywsgZxBQKOZ5BgAmj6I8IFovVyXxdxcb0eTIt7vY
bx6Owwvtcohza7SvZz9XzsH7LtrCc17E0+1SQ1pkLdO3P9GDBciaQVceG2wuTu9D
6+dLYW5chA5MXg6AmuxqrfzPBERUlQyo3Jg3yvdKMbGqTfVBoqvm9JzP5n8WOIkU
KEsYnMQE2nUuS2CS/VC2mJppnIqys6IEscQ16A807bZsC6/CrPtlaO5sRSZAfHCI
NPXgpvOKyhp0IOQozXoYyYesK81fRFVEj7rIzQXTx3Qj9CWli8s=
=zqaX
—–END PGP SIGNATURE—–

Autor161.53.13.146
Cert idNCERT-REF-2020-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Red Hat Ansible Tower

Otkriveni su sigurnosni nedostaci u programskom paketu Red Hat Ansible Tower za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju...

Close