Ubuntu 2608-1: QEMU vulnerabilities

    Date13 May 2015
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in QEMU.
    Ubuntu Security Notice USN-2608-1
    May 13, 2015
    qemu, qemu-kvm vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 15.04
    - Ubuntu 14.10
    - Ubuntu 14.04 LTS
    - Ubuntu 12.04 LTS
    Several security issues were fixed in QEMU.
    Software Description:
    - qemu: Machine emulator and virtualizer
    - qemu-kvm: Machine emulator and virtualizer
    Jason Geffner discovered that QEMU incorrectly handled the virtual floppy
    driver. This issue is known as VENOM. A malicious guest could use this
    issue to cause a denial of service, or possibly execute arbitrary code on
    the host as the user running the QEMU process. In the default installation,
    when QEMU is used with libvirt, attackers would be isolated by the libvirt
    AppArmor profile. (CVE-2015-3456)
    Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets.
    A remote attacker could use this issue to cause QEMU to consume memory,
    resulting in a denial of service. This issue only affected Ubuntu 14.04
    LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779)
    Jan Beulich discovered that QEMU, when used with Xen, didn't properly
    restrict access to PCI command registers. A malicious guest could use this
    issue to cause a denial of service. This issue only affected Ubuntu 14.04
    LTS and Ubuntu 14.10. (CVE-2015-2756)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 15.04:
      qemu-system                     1:2.2+dfsg-5expubuntu9.1
      qemu-system-aarch64             1:2.2+dfsg-5expubuntu9.1
      qemu-system-arm                 1:2.2+dfsg-5expubuntu9.1
      qemu-system-mips                1:2.2+dfsg-5expubuntu9.1
      qemu-system-misc                1:2.2+dfsg-5expubuntu9.1
      qemu-system-ppc                 1:2.2+dfsg-5expubuntu9.1
      qemu-system-sparc               1:2.2+dfsg-5expubuntu9.1
      qemu-system-x86                 1:2.2+dfsg-5expubuntu9.1
    Ubuntu 14.10:
      qemu-system                     2.1+dfsg-4ubuntu6.6
      qemu-system-aarch64             2.1+dfsg-4ubuntu6.6
      qemu-system-arm                 2.1+dfsg-4ubuntu6.6
      qemu-system-mips                2.1+dfsg-4ubuntu6.6
      qemu-system-misc                2.1+dfsg-4ubuntu6.6
      qemu-system-ppc                 2.1+dfsg-4ubuntu6.6
      qemu-system-sparc               2.1+dfsg-4ubuntu6.6
      qemu-system-x86                 2.1+dfsg-4ubuntu6.6
    Ubuntu 14.04 LTS:
      qemu-system                     2.0.0+dfsg-2ubuntu1.11
      qemu-system-aarch64             2.0.0+dfsg-2ubuntu1.11
      qemu-system-arm                 2.0.0+dfsg-2ubuntu1.11
      qemu-system-mips                2.0.0+dfsg-2ubuntu1.11
      qemu-system-misc                2.0.0+dfsg-2ubuntu1.11
      qemu-system-ppc                 2.0.0+dfsg-2ubuntu1.11
      qemu-system-sparc               2.0.0+dfsg-2ubuntu1.11
      qemu-system-x86                 2.0.0+dfsg-2ubuntu1.11
    Ubuntu 12.04 LTS:
      qemu-kvm                        1.0+noroms-0ubuntu14.22
    After a standard system update you need to restart all QEMU virtual
    machines to make all the necessary changes.
      CVE-2015-1779, CVE-2015-2756, CVE-2015-3456
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"34","type":"x","order":"1","pct":91.89,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"2","type":"x","order":"2","pct":5.41,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"1","type":"x","order":"3","pct":2.7,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.