Ausführen beliebiger Kommandos in QEMU
ID: | USN-4511-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS |
Datum: | Do, 17. September 2020, 23:18 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364 |
Applikationen: | QEMU |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2318672095130623183== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN Content-Type: multipart/mixed; boundary="FMsgJE4LlbDSYdbYdKYqrggMrBlY8GSBY" --FMsgJE4LlbDSYdbYdKYqrggMrBlY8GSBY Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-4511-1 September 17, 2020 qemu vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: QEMU could be made to crash or run programs. Software Description: - qemu: Machine emulator and virtualizer Details: Ziming Zhang, Xiao Wei, Gonglei Arei, and Yanyu Zhang discovered that QEMU incorrectly handled certain USB packets. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: qemu 1:4.2-3ubuntu6.6 qemu-system 1:4.2-3ubuntu6.6 qemu-system-arm 1:4.2-3ubuntu6.6 qemu-system-mips 1:4.2-3ubuntu6.6 qemu-system-ppc 1:4.2-3ubuntu6.6 qemu-system-s390x 1:4.2-3ubuntu6.6 qemu-system-sparc 1:4.2-3ubuntu6.6 qemu-system-x86 1:4.2-3ubuntu6.6 qemu-system-x86-microvm 1:4.2-3ubuntu6.6 qemu-system-x86-xen 1:4.2-3ubuntu6.6 Ubuntu 18.04 LTS: qemu 1:2.11+dfsg-1ubuntu7.32 qemu-system 1:2.11+dfsg-1ubuntu7.32 qemu-system-arm 1:2.11+dfsg-1ubuntu7.32 qemu-system-mips 1:2.11+dfsg-1ubuntu7.32 qemu-system-ppc 1:2.11+dfsg-1ubuntu7.32 qemu-system-s390x 1:2.11+dfsg-1ubuntu7.32 qemu-system-sparc 1:2.11+dfsg-1ubuntu7.32 qemu-system-x86 1:2.11+dfsg-1ubuntu7.32 Ubuntu 16.04 LTS: qemu 1:2.5+dfsg-5ubuntu10.46 qemu-block-extra 1:2.5+dfsg-5ubuntu10.46 qemu-guest-agent 1:2.5+dfsg-5ubuntu10.46 qemu-kvm 1:2.5+dfsg-5ubuntu10.46 qemu-system 1:2.5+dfsg-5ubuntu10.46 qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.46 qemu-system-arm 1:2.5+dfsg-5ubuntu10.46 qemu-system-common 1:2.5+dfsg-5ubuntu10.46 qemu-system-mips 1:2.5+dfsg-5ubuntu10.46 qemu-system-misc 1:2.5+dfsg-5ubuntu10.46 qemu-system-ppc 1:2.5+dfsg-5ubuntu10.46 qemu-system-s390x 1:2.5+dfsg-5ubuntu10.46 qemu-system-sparc 1:2.5+dfsg-5ubuntu10.46 qemu-system-x86 1:2.5+dfsg-5ubuntu10.46 qemu-user 1:2.5+dfsg-5ubuntu10.46 qemu-user-binfmt 1:2.5+dfsg-5ubuntu10.46 qemu-user-static 1:2.5+dfsg-5ubuntu10.46 qemu-utils 1:2.5+dfsg-5ubuntu10.46 After a standard system update you need to restart all QEMU virtual machines to make all the necessary changes. References: https://usn.ubuntu.com/4511-1 CVE-2020-14364 Package Information: https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.6 https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.32 https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.46 --FMsgJE4LlbDSYdbYdKYqrggMrBlY8GSBY-- --b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl9jUbAACgkQZWnYVadE vpPzSxAAtUF6wfe7wuGmHyfcsqCMZZo9zLoE/xm30qrBmn2pAnyG7/xHDViR0G9L fpX1+DWnTpVOnMd3c6PRzpL2HAcTVv4iiureNnw2NvUWFYlvDHpN40pUlkApFj+V jUe7XUJ1s4Cc2be1JGan6i3zyU8WY/kzMYwpSFKwiYr4okOo9311Abvs6uXhRAje BgGmrGr6e7EFJ690spxdhPFP9lWIz20lH0BrdldwDMzfqR6HBnqa3oCrIysIKUH5 3214EZoVyg0eQRQDbU7FKoPBRDzwTEqz0qtWNtl5FABCDo5DPrC/OyJjOjdHEJS3 dpHZfnwfgaKR79N2EhwctmpBtp0/SyX4sBHbK//94t2MRwFg2NiPOGoUFflEIyGC I4hyZBuOPcKhwiQXbXBeYXlT8IxIapF/ANSK+k0zFz0TBeiVn0B0ixxZLkQVRmBE pHGr5DdxocUNR2cCUdPf7/T7O9RbE9zeCzmpU3pWI/1gkr3vo3DF6N0wSML9R5Qi UeWI/hkGHoi+mTxfybHNcd3ryAoXpLAOB1hFiTIJAJs31LANDRPOSZwBdh0uDWSW CN9HWW2AKX3WnDhPXp3cx1Ctg5SW6YQiWg5H4mHu+AWC47D5ujuyvmQMEyX8Lkgn xjZcZriyk2H4YI+PRBbzM5wMdUoSKLkLjfToXsJSPWOoS/T3gDM= =ZcUT -----END PGP SIGNATURE----- --b7eGRHlLc4PRaAjdX9xhyo5LdVn5YFqwN-- --===============2318672095130623183== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============2318672095130623183==-- |