Ubuntu Security Notice USN-2692-1
28th July, 2015
qemu vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in QEMU.
Software description
- qemu - Machine emulator and virtualizer
Details
Matt Tait discovered that QEMU incorrectly handled PIT emulation. In a
non-default configuration, a malicious guest could use this issue to cause
a denial of service, or possibly execute arbitrary code on the host as the
user running the QEMU process. In the default installation, when QEMU is
used with libvirt, attackers would be isolated by the libvirt AppArmor
profile. (CVE-2015-3214)
Kevin Wolf discovered that QEMU incorrectly handled processing ATAPI
commands. A malicious guest could use this issue to cause a denial of
service, or possibly execute arbitrary code on the host as the user running
the QEMU process. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2015-5154)
Zhu Donghai discovered that QEMU incorrectly handled the SCSI driver. A
malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile. This issue
only affected Ubuntu 15.04. (CVE-2015-5158)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 15.04:
- qemu-system-misc 1:2.2+dfsg-5expubuntu9.3
- qemu-system 1:2.2+dfsg-5expubuntu9.3
- qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.3
- qemu-system-x86 1:2.2+dfsg-5expubuntu9.3
- qemu-system-sparc 1:2.2+dfsg-5expubuntu9.3
- qemu-system-arm 1:2.2+dfsg-5expubuntu9.3
- qemu-system-ppc 1:2.2+dfsg-5expubuntu9.3
- qemu-system-mips 1:2.2+dfsg-5expubuntu9.3
- Ubuntu 14.04 LTS:
- qemu-system-misc 2.0.0+dfsg-2ubuntu1.15
- qemu-system 2.0.0+dfsg-2ubuntu1.15
- qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.15
- qemu-system-x86 2.0.0+dfsg-2ubuntu1.15
- qemu-system-sparc 2.0.0+dfsg-2ubuntu1.15
- qemu-system-arm 2.0.0+dfsg-2ubuntu1.15
- qemu-system-ppc 2.0.0+dfsg-2ubuntu1.15
- qemu-system-mips 2.0.0+dfsg-2ubuntu1.15
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.
References
CVE-2015-3214, CVE-2015-5154, CVE-2015-5158
from Ubuntu Security Notices http://ift.tt/1h37kaV
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.