Your submission was sent successfully! Close

USN-4511-1: QEMU vulnerability

17 September 2020

QEMU could be made to crash or run programs.



  • qemu - Machine emulator and virtualizer


Ziming Zhang, Xiao Wei, Gonglei Arei, and Yanyu Zhang discovered that QEMU
incorrectly handled certain USB packets. An attacker inside the guest could
use this issue to cause QEMU to crash, resulting in a denial of service, or
possibly execute arbitrary code on the host. In the default installation,
when QEMU is used with libvirt, attackers would be isolated by the libvirt
AppArmor profile.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.


Related notices

  • USN-4467-2: qemu-kvm, qemu-user, qemu-system-misc, qemu-system-aarch64, qemu-system-sparc, qemu-utils, qemu-keymaps, qemu-system-x86, qemu-system-mips, qemu-system-common, qemu-common, qemu-system-arm, qemu, qemu-system, qemu-guest-agent, qemu-system-ppc, qemu-user-static