Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in QEMU
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in QEMU
ID: USN-7094-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Mo, 11. November 2024, 15:30
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2084210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039
Applikationen: QEMU

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6072697764879323072==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------ErgIJUXNEsh9rkoyv6aXhK4W"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------ErgIJUXNEsh9rkoyv6aXhK4W
Content-Type: multipart/mixed;
boundary="------------0Ci41Yc1KsLzyXp2gXmB0JNr";
protected-headers="v1"
From: Bruce Cable <bruce.cable@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <b1c479ba-90f6-4714-b8b4-b5c81f7453d9@canonical.com>
Subject: [USN-7094-1] QEMU vulnerabilities

--------------0Ci41Yc1KsLzyXp2gXmB0JNr
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7094-1
November 08, 2024

qemu vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
- qemu: Machine emulator and virtualizer

Details:

It was discovered that QEMU incorrectly handled memory during certain VNC
operations. A remote attacker could possibly use this issue to cause QEMU
to consume resources, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS. (CVE-2019-20382)

It was discovered that QEMU incorrectly handled certain memory copy
operations when loading ROM contents. If a user were tricked into running
an untrusted kernel image, a remote attacker could possibly use this issue
to run arbitrary code. This issue only affected Ubuntu 14.04 LTS.
(CVE-2020-13765)

Aviv Sasson discovered that QEMU incorrectly handled Slirp networking. A
remote attacker could use this issue to cause QEMU to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 14.04 LTS. (CVE-2020-1983)

It was discovered that the SLiRP networking implementation of the QEMU
emulator did not properly manage memory under certain circumstances. An
attacker could use this to cause a heap-based buffer overflow or other out-
of-bounds access, which can lead to a denial of service (application crash)
or potential execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS. (CVE-2020-7039)

It was discovered that the SLiRP networking implementation of the QEMU
emulator misuses snprintf return values. An attacker could use this to
cause a denial of service (application crash) or potentially execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-8608)

It was discovered that QEMU SLiRP networking incorrectly handled certain
udp packets. An attacker inside a guest could possibly use this issue to
leak sensitive information from the host. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2021-3592, CVE-2021-3594)

It was discovered that QEMU had a DMA reentrancy issue, leading to a
use-after-free vulnerability. An attacker could possibly use this issue
to cause a denial of service. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3019)

It was discovered that QEMU had a flaw in Virtio PCI Bindings, leading
to a triggerable crash via vhost_net_stop. An attacker inside a guest
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-4693)

It was discovered that QEMU incorrectly handled memory in virtio-sound,
leading to a heap-based buffer overflow. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code. This
issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-7730)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  qemu-system                     1:9.0.2+ds-4ubuntu5.1
  qemu-system-arm                 1:9.0.2+ds-4ubuntu5.1
  qemu-system-mips                1:9.0.2+ds-4ubuntu5.1
  qemu-system-misc                1:9.0.2+ds-4ubuntu5.1
  qemu-system-ppc                 1:9.0.2+ds-4ubuntu5.1
  qemu-system-s390x               1:9.0.2+ds-4ubuntu5.1
  qemu-system-sparc               1:9.0.2+ds-4ubuntu5.1
  qemu-system-x86                 1:9.0.2+ds-4ubuntu5.1
  qemu-system-x86-xen             1:9.0.2+ds-4ubuntu5.1
  qemu-system-xen                 1:9.0.2+ds-4ubuntu5.1

Ubuntu 24.04 LTS
  qemu-system                     1:8.2.2+ds-0ubuntu1.4
  qemu-system-arm                 1:8.2.2+ds-0ubuntu1.4
  qemu-system-mips                1:8.2.2+ds-0ubuntu1.4
  qemu-system-misc                1:8.2.2+ds-0ubuntu1.4
  qemu-system-ppc                 1:8.2.2+ds-0ubuntu1.4
  qemu-system-s390x               1:8.2.2+ds-0ubuntu1.4
  qemu-system-sparc               1:8.2.2+ds-0ubuntu1.4
  qemu-system-x86                 1:8.2.2+ds-0ubuntu1.4
  qemu-system-x86-xen             1:8.2.2+ds-0ubuntu1.4
  qemu-system-xen                 1:8.2.2+ds-0ubuntu1.4

Ubuntu 22.04 LTS
  qemu                            1:6.2+dfsg-2ubuntu6.24
  qemu-system                     1:6.2+dfsg-2ubuntu6.24
  qemu-system-arm                 1:6.2+dfsg-2ubuntu6.24
  qemu-system-mips                1:6.2+dfsg-2ubuntu6.24
  qemu-system-misc                1:6.2+dfsg-2ubuntu6.24
  qemu-system-ppc                 1:6.2+dfsg-2ubuntu6.24
  qemu-system-s390x               1:6.2+dfsg-2ubuntu6.24
  qemu-system-sparc               1:6.2+dfsg-2ubuntu6.24
  qemu-system-x86                 1:6.2+dfsg-2ubuntu6.24
  qemu-system-x86-microvm         1:6.2+dfsg-2ubuntu6.24
  qemu-system-x86-xen             1:6.2+dfsg-2ubuntu6.24

Ubuntu 20.04 LTS
  qemu                            1:4.2-3ubuntu6.30
  qemu-system                     1:4.2-3ubuntu6.30
  qemu-system-arm                 1:4.2-3ubuntu6.30
  qemu-system-mips                1:4.2-3ubuntu6.30
  qemu-system-misc                1:4.2-3ubuntu6.30
  qemu-system-ppc                 1:4.2-3ubuntu6.30
  qemu-system-s390x               1:4.2-3ubuntu6.30
  qemu-system-sparc               1:4.2-3ubuntu6.30
  qemu-system-x86                 1:4.2-3ubuntu6.30
  qemu-system-x86-microvm         1:4.2-3ubuntu6.30
  qemu-system-x86-xen             1:4.2-3ubuntu6.30

Ubuntu 18.04 LTS
  qemu                            1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system                     1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-arm                 1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-mips                1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-misc                1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-ppc                 1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-s390x               1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-sparc               1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro
  qemu-system-x86                 1:2.11+dfsg-1ubuntu7.42+esm2
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  qemu                            1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system                     1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-aarch64             1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-arm                 1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-common              1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-mips                1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-misc                1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-ppc                 1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-s390x               1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-sparc               1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro
  qemu-system-x86                 1:2.5+dfsg-5ubuntu10.51+esm3
                                  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  qemu                            2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system                     2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-aarch64             2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-arm                 2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-common              2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-mips                2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-misc                2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-ppc                 2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-sparc               2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro
  qemu-system-x86                 2.0.0+dfsg-2ubuntu1.47+esm4
                                  Available with Ubuntu Pro

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7094-1
  CVE-2019-20382, CVE-2020-13765, CVE-2020-1983, CVE-2020-7039,
  CVE-2020-8608, CVE-2021-3592, CVE-2021-3594, CVE-2023-3019,
  CVE-2024-4693, CVE-2024-7730,
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2084210

Package Information:
  https://launchpad.net/ubuntu/+source/qemu/1:9.0.2+ds-4ubuntu5.1
  https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.4
  https://launchpad.net/ubuntu/+source/qemu/1:6.2+dfsg-2ubuntu6.24
  https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.30


--------------0Ci41Yc1KsLzyXp2gXmB0JNr--

--------------ErgIJUXNEsh9rkoyv6aXhK4W
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=XiEY
-----END PGP SIGNATURE-----

--------------ErgIJUXNEsh9rkoyv6aXhK4W--


--===============6072697764879323072==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============6072697764879323072==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung