You are here
Home > Preporuke > Sigurnosni nedostaci programskih paketa qemu i qemu-kvm

Sigurnosni nedostaci programskih paketa qemu i qemu-kvm

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2745-1
September 24, 2015

qemu, qemu-kvm vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.04
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
– qemu: Machine emulator and virtualizer
– qemu-kvm: Machine emulator and virtualizer

Details:

Lian Yihan discovered that QEMU incorrectly handled certain payload
messages in the VNC display driver. A malicious guest could use this issue
to cause the QEMU process to hang, resulting in a denial of service. This
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-5239)

Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause the QEMU process to hang, resulting in a denial of service.
(CVE-2015-5278)

Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause a denial of service, or possibly execute arbitrary code on
the host as the user running the QEMU process. In the default installation,
when QEMU is used with libvirt, attackers would be isolated by the libvirt
AppArmor profile. (CVE-2015-5279)

Qinghao Tang discovered that QEMU incorrectly handled transmit descriptor
data when sending network packets. A malicious guest could use this issue
to cause the QEMU process to hang, resulting in a denial of service.
(CVE-2015-6815)

Qinghao Tang discovered that QEMU incorrectly handled ATAPI command
permissions. A malicious guest could use this issue to cause the QEMU
process to crash, resulting in a denial of service. (CVE-2015-6855)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
qemu-system 1:2.2+dfsg-5expubuntu9.5
qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.5
qemu-system-arm 1:2.2+dfsg-5expubuntu9.5
qemu-system-mips 1:2.2+dfsg-5expubuntu9.5
qemu-system-misc 1:2.2+dfsg-5expubuntu9.5
qemu-system-ppc 1:2.2+dfsg-5expubuntu9.5
qemu-system-sparc 1:2.2+dfsg-5expubuntu9.5
qemu-system-x86 1:2.2+dfsg-5expubuntu9.5

Ubuntu 14.04 LTS:
qemu-system 2.0.0+dfsg-2ubuntu1.19
qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.19
qemu-system-arm 2.0.0+dfsg-2ubuntu1.19
qemu-system-mips 2.0.0+dfsg-2ubuntu1.19
qemu-system-misc 2.0.0+dfsg-2ubuntu1.19
qemu-system-ppc 2.0.0+dfsg-2ubuntu1.19
qemu-system-sparc 2.0.0+dfsg-2ubuntu1.19
qemu-system-x86 2.0.0+dfsg-2ubuntu1.19

Ubuntu 12.04 LTS:
qemu-kvm 1.0+noroms-0ubuntu14.25

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2745-1
CVE-2015-5239, CVE-2015-5278, CVE-2015-5279, CVE-2015-6815,
CVE-2015-6855

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:2.2+dfsg-5expubuntu9.5
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.19
https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.25

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAEBCgAGBQJWBEQqAAoJEGVp2FWnRL6TWQMP/0It8cb2HDXTF0ds3qBYrPH2
5dEUaADXOiw/aqqWr3la6o5s5e+8YDqCSqnQBMtS6UqsVaFVqnnBuayjW2pGobYZ
/jCZH8B8O8ZZt3CXRMI36kffudyBUXVRJNkWEyhZks02VoOWNGgVAu+dUKDgHeJH
dJG6JhVvbVk1+DUcYbRhpNiC0E9AzN/8BXe328h1ZPDTubizfhvDJ91cZi2V6obc
b/wHOB6fvqF2Taxa+iByoNIp3TCLB3fai4kYyLBOUX09LucB7qn1Or1RCVKHFxqw
U2clJSn43Yfyw8Cw6vj2ZXY9sxGLGr1uDFj05BigZ378OqtmXBzeixidkfJfPq5l
xYqGdp6gcWHShPubny2vFb8YTHkF/OO4ZU+hmhSDWzEodgaLB48kBQphl0Gf1Wrn
5JDjM3u1i5x0xDcp2virpdOADjiKnBBbgr+F67kjKUf1Ek+AruSXHRoTS5K63QSx
Kn6TDhnaTFx83/RYEEgpbbnLdVvsJBD/ZZYETJoRQC9tFSiljCyZOI3xVSpqak7V
FYEQFcwBwWD5ud5Bm75WUwBDm/r/k//appojxACTt3M9JeUGlVLC5qo3xK7MMGXg
1UQZjNEKzSuPw0MiyFuM27cXhTK4XAl1RXupwUyi0Hl8hfc+PxALmY5ruh9INpPH
8KaOXkLVl3BrhOzT7Fna
=YhhL
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2015-09-0024-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak aplikacije Simple Streams

Otkriven je sigurnosni nedostatak u radu aplikacije Simple Streams za Ubuntu 15.04 i 14.04 LTS. Otkriveni nedostatak potencijalnim udaljenim napadačima...

Close