USN-3649-1: QEMU vulnerabilities
16 May 2018
Several security issues were fixed in QEMU.
Releases
Packages
- qemu - Machine emulator and virtualizer
Details
Cyrille Chatras discovered that QEMU incorrectly handled certain PS2 values
during migration. An attacker could possibly use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS. (CVE-2017-16845)
Cyrille Chatras discovered that QEMU incorrectly handled multiboot. An
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service, or possibly execute arbitrary code on the host. In the default
installation, when QEMU is used with libvirt, attackers would be isolated
by the libvirt AppArmor profile. (CVE-2018-7550)
Ross Lagerwall discovered that QEMU incorrectly handled the Cirrus VGA
device. A privileged attacker inside the guest could use this issue to
cause QEMU to crash, resulting in a denial of service. This issue only
affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7858)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
qemu-system
-
1:2.11+dfsg-1ubuntu7.1
-
qemu-system-arm
-
1:2.11+dfsg-1ubuntu7.1
-
qemu-system-mips
-
1:2.11+dfsg-1ubuntu7.1
-
qemu-system-ppc
-
1:2.11+dfsg-1ubuntu7.1
-
qemu-system-s390x
-
1:2.11+dfsg-1ubuntu7.1
-
qemu-system-sparc
-
1:2.11+dfsg-1ubuntu7.1
-
qemu-system-x86
-
1:2.11+dfsg-1ubuntu7.1
Ubuntu 17.10
-
qemu-system
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-aarch64
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-arm
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-mips
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-ppc
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-s390x
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-sparc
-
1:2.10+dfsg-0ubuntu3.6
-
qemu-system-x86
-
1:2.10+dfsg-0ubuntu3.6
Ubuntu 16.04
-
qemu-system
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-aarch64
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-arm
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-mips
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-ppc
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-s390x
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-sparc
-
1:2.5+dfsg-5ubuntu10.28
-
qemu-system-x86
-
1:2.5+dfsg-5ubuntu10.28
Ubuntu 14.04
-
qemu-system
-
2.0.0+dfsg-2ubuntu1.41
-
qemu-system-aarch64
-
2.0.0+dfsg-2ubuntu1.41
-
qemu-system-arm
-
2.0.0+dfsg-2ubuntu1.41
-
qemu-system-mips
-
2.0.0+dfsg-2ubuntu1.41
-
qemu-system-ppc
-
2.0.0+dfsg-2ubuntu1.41
-
qemu-system-sparc
-
2.0.0+dfsg-2ubuntu1.41
-
qemu-system-x86
-
2.0.0+dfsg-2ubuntu1.41
After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.
References
Related notices
- USN-3575-1: qemu-user, qemu-system-x86, qemu-system-mips, qemu-system-misc, qemu-system-aarch64, qemu-system-common, qemu-system-s390x, qemu-block-extra, qemu-system-sparc, qemu, qemu-common, qemu-user-static, qemu-kvm, qemu-keymaps, qemu-system-ppc, qemu-utils, qemu-user-binfmt, qemu-system, qemu-system-arm, qemu-guest-agent