Ubuntu 2608-1: QEMU vulnerabilities

    Date13 May 2015
    CategoryUbuntu
    46
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in QEMU.
    ==========================================================================
    Ubuntu Security Notice USN-2608-1
    May 13, 2015
    
    qemu, qemu-kvm vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 15.04
    - Ubuntu 14.10
    - Ubuntu 14.04 LTS
    - Ubuntu 12.04 LTS
    
    Summary:
    
    Several security issues were fixed in QEMU.
    
    Software Description:
    - qemu: Machine emulator and virtualizer
    - qemu-kvm: Machine emulator and virtualizer
    
    Details:
    
    Jason Geffner discovered that QEMU incorrectly handled the virtual floppy
    driver. This issue is known as VENOM. A malicious guest could use this
    issue to cause a denial of service, or possibly execute arbitrary code on
    the host as the user running the QEMU process. In the default installation,
    when QEMU is used with libvirt, attackers would be isolated by the libvirt
    AppArmor profile. (CVE-2015-3456)
    
    Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets.
    A remote attacker could use this issue to cause QEMU to consume memory,
    resulting in a denial of service. This issue only affected Ubuntu 14.04
    LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779)
    
    Jan Beulich discovered that QEMU, when used with Xen, didn't properly
    restrict access to PCI command registers. A malicious guest could use this
    issue to cause a denial of service. This issue only affected Ubuntu 14.04
    LTS and Ubuntu 14.10. (CVE-2015-2756)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 15.04:
      qemu-system                     1:2.2+dfsg-5expubuntu9.1
      qemu-system-aarch64             1:2.2+dfsg-5expubuntu9.1
      qemu-system-arm                 1:2.2+dfsg-5expubuntu9.1
      qemu-system-mips                1:2.2+dfsg-5expubuntu9.1
      qemu-system-misc                1:2.2+dfsg-5expubuntu9.1
      qemu-system-ppc                 1:2.2+dfsg-5expubuntu9.1
      qemu-system-sparc               1:2.2+dfsg-5expubuntu9.1
      qemu-system-x86                 1:2.2+dfsg-5expubuntu9.1
    
    Ubuntu 14.10:
      qemu-system                     2.1+dfsg-4ubuntu6.6
      qemu-system-aarch64             2.1+dfsg-4ubuntu6.6
      qemu-system-arm                 2.1+dfsg-4ubuntu6.6
      qemu-system-mips                2.1+dfsg-4ubuntu6.6
      qemu-system-misc                2.1+dfsg-4ubuntu6.6
      qemu-system-ppc                 2.1+dfsg-4ubuntu6.6
      qemu-system-sparc               2.1+dfsg-4ubuntu6.6
      qemu-system-x86                 2.1+dfsg-4ubuntu6.6
    
    Ubuntu 14.04 LTS:
      qemu-system                     2.0.0+dfsg-2ubuntu1.11
      qemu-system-aarch64             2.0.0+dfsg-2ubuntu1.11
      qemu-system-arm                 2.0.0+dfsg-2ubuntu1.11
      qemu-system-mips                2.0.0+dfsg-2ubuntu1.11
      qemu-system-misc                2.0.0+dfsg-2ubuntu1.11
      qemu-system-ppc                 2.0.0+dfsg-2ubuntu1.11
      qemu-system-sparc               2.0.0+dfsg-2ubuntu1.11
      qemu-system-x86                 2.0.0+dfsg-2ubuntu1.11
    
    Ubuntu 12.04 LTS:
      qemu-kvm                        1.0+noroms-0ubuntu14.22
    
    After a standard system update you need to restart all QEMU virtual
    machines to make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2608-1
      CVE-2015-1779, CVE-2015-2756, CVE-2015-3456
    
    Package Information:
      https://launchpad.net/ubuntu/+source/qemu/1:2.2+dfsg-5expubuntu9.1
      https://launchpad.net/ubuntu/+source/qemu/2.1+dfsg-4ubuntu6.6
      https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.11
      https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.22
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.