Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in QEMU
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in QEMU
ID: USN-4511-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS
Datum: Do, 17. September 2020, 23:18
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
Applikationen: QEMU

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2318672095130623183==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN
Content-Type: multipart/mixed;
boundary="FMsgJE4LlbDSYdbYdKYqrggMrBlY8GSBY"

--FMsgJE4LlbDSYdbYdKYqrggMrBlY8GSBY
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4511-1
September 17, 2020

qemu vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

QEMU could be made to crash or run programs.

Software Description:
- qemu: Machine emulator and virtualizer

Details:

Ziming Zhang, Xiao Wei, Gonglei Arei, and Yanyu Zhang discovered that QEMU
incorrectly handled certain USB packets. An attacker inside the guest could
use this issue to cause QEMU to crash, resulting in a denial of service, or
possibly execute arbitrary code on the host. In the default installation,
when QEMU is used with libvirt, attackers would be isolated by the libvirt
AppArmor profile.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
qemu 1:4.2-3ubuntu6.6
qemu-system 1:4.2-3ubuntu6.6
qemu-system-arm 1:4.2-3ubuntu6.6
qemu-system-mips 1:4.2-3ubuntu6.6
qemu-system-ppc 1:4.2-3ubuntu6.6
qemu-system-s390x 1:4.2-3ubuntu6.6
qemu-system-sparc 1:4.2-3ubuntu6.6
qemu-system-x86 1:4.2-3ubuntu6.6
qemu-system-x86-microvm 1:4.2-3ubuntu6.6
qemu-system-x86-xen 1:4.2-3ubuntu6.6

Ubuntu 18.04 LTS:
qemu 1:2.11+dfsg-1ubuntu7.32
qemu-system 1:2.11+dfsg-1ubuntu7.32
qemu-system-arm 1:2.11+dfsg-1ubuntu7.32
qemu-system-mips 1:2.11+dfsg-1ubuntu7.32
qemu-system-ppc 1:2.11+dfsg-1ubuntu7.32
qemu-system-s390x 1:2.11+dfsg-1ubuntu7.32
qemu-system-sparc 1:2.11+dfsg-1ubuntu7.32
qemu-system-x86 1:2.11+dfsg-1ubuntu7.32

Ubuntu 16.04 LTS:
qemu 1:2.5+dfsg-5ubuntu10.46
qemu-block-extra 1:2.5+dfsg-5ubuntu10.46
qemu-guest-agent 1:2.5+dfsg-5ubuntu10.46
qemu-kvm 1:2.5+dfsg-5ubuntu10.46
qemu-system 1:2.5+dfsg-5ubuntu10.46
qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.46
qemu-system-arm 1:2.5+dfsg-5ubuntu10.46
qemu-system-common 1:2.5+dfsg-5ubuntu10.46
qemu-system-mips 1:2.5+dfsg-5ubuntu10.46
qemu-system-misc 1:2.5+dfsg-5ubuntu10.46
qemu-system-ppc 1:2.5+dfsg-5ubuntu10.46
qemu-system-s390x 1:2.5+dfsg-5ubuntu10.46
qemu-system-sparc 1:2.5+dfsg-5ubuntu10.46
qemu-system-x86 1:2.5+dfsg-5ubuntu10.46
qemu-user 1:2.5+dfsg-5ubuntu10.46
qemu-user-binfmt 1:2.5+dfsg-5ubuntu10.46
qemu-user-static 1:2.5+dfsg-5ubuntu10.46
qemu-utils 1:2.5+dfsg-5ubuntu10.46

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://usn.ubuntu.com/4511-1
CVE-2020-14364

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.6
https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.32
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.46


--FMsgJE4LlbDSYdbYdKYqrggMrBlY8GSBY--

--b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=ZcUT
-----END PGP SIGNATURE-----

--b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN--


--===============2318672095130623183==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============2318672095130623183==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung