This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0613821080686751353== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="vUnYRpwM3vSy95UF4mt1GYdMn5cKCxCzP"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --vUnYRpwM3vSy95UF4mt1GYdMn5cKCxCzP Content-Type: multipart/mixed; boundary="qgvOAvxj4T4yKlnkZM4FvHHcpuU5dVa0w"
--qgvOAvxj4T4yKlnkZM4FvHHcpuU5dVa0w Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4467-1 August 19, 2020
qemu vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description: - qemu: Machine emulator and virtualizer
Details:
Ziming Zhang and VictorV discovered that the QEMU SLiRP networking implementation incorrectly handled replying to certain ICMP echo requests. An attacker inside a guest could possibly use this issue to leak host memory to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS. (CVE-2020-10756)
Eric Blake and Xueqiang Wei discovered that the QEMU NDB implementation incorrectly handled certain requests. A remote attacker could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-10761)
Ziming Zhang discovered that the QEMU SM501 graphics driver incorrectly handled certain operations. An attacker inside a guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-12829)
It was discovered that the QEMU SD memory card implementation incorrectly handled certain memory operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13253)
Ren Ding and Hanqing Zhao discovered that the QEMU ES1370 audio driver incorrectly handled certain invalid frame counts. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13361)
Ren Ding and Hanqing Zhao discovered that the QEMU MegaRAID SAS SCSI driver incorrectly handled certain memory operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13362)
Alexander Bulekov discovered that QEMU MegaRAID SAS SCSI driver incorrectly handled certain memory space operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13659)
Ren Ding, Hanqing Zhao, Alexander Bulekov, and Anatoly Trosinenko discovered that the QEMU incorrectly handled certain msi-x mmio operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13754)
It was discovered that QEMU incorrectly handled certain memory copy operations when loading ROM contents. If a user were tricked into running an untrusted kernel image, a remote attacker could possibly use this issue to run arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-13765)
Ren Ding, Hanqing Zhao, and Yi Ren discovered that the QEMU ATI video driver incorrectly handled certain index values. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-13800)
Ziming Zhang discovered that the QEMU OSS audio driver incorrectly handled certain operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-14415)
Ziming Zhang discovered that the QEMU XGMAC Ethernet controller incorrectly handled packet transmission. An attacker inside a guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-15863)
Ziming Zhang discovered that the QEMU e1000e Ethernet controller incorrectly handled packet processing. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-16092)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: qemu 1:4.2-3ubuntu6.4 qemu-system 1:4.2-3ubuntu6.4 qemu-system-arm 1:4.2-3ubuntu6.4 qemu-system-mips 1:4.2-3ubuntu6.4 qemu-system-ppc 1:4.2-3ubuntu6.4 qemu-system-s390x 1:4.2-3ubuntu6.4 qemu-system-sparc 1:4.2-3ubuntu6.4 qemu-system-x86 1:4.2-3ubuntu6.4 qemu-system-x86-microvm 1:4.2-3ubuntu6.4 qemu-system-x86-xen 1:4.2-3ubuntu6.4
Ubuntu 18.04 LTS: qemu 1:2.11+dfsg-1ubuntu7.31 qemu-system 1:2.11+dfsg-1ubuntu7.31 qemu-system-mips 1:2.11+dfsg-1ubuntu7.31 qemu-system-ppc 1:2.11+dfsg-1ubuntu7.31 qemu-system-s390x 1:2.11+dfsg-1ubuntu7.31 qemu-system-sparc 1:2.11+dfsg-1ubuntu7.31 qemu-system-x86 1:2.11+dfsg-1ubuntu7.31
Ubuntu 16.04 LTS: qemu 1:2.5+dfsg-5ubuntu10.45 qemu-system 1:2.5+dfsg-5ubuntu10.45 qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.45 qemu-system-arm 1:2.5+dfsg-5ubuntu10.45 qemu-system-mips 1:2.5+dfsg-5ubuntu10.45 qemu-system-ppc 1:2.5+dfsg-5ubuntu10.45 qemu-system-s390x 1:2.5+dfsg-5ubuntu10.45 qemu-system-sparc 1:2.5+dfsg-5ubuntu10.45 qemu-system-x86 1:2.5+dfsg-5ubuntu10.45
After a standard system update you need to restart all QEMU virtual machines to make all the necessary changes.
References: https://usn.ubuntu.com/4467-1 CVE-2020-10756, CVE-2020-10761, CVE-2020-12829, CVE-2020-13253, CVE-2020-13361, CVE-2020-13362, CVE-2020-13659, CVE-2020-13754, CVE-2020-13765, CVE-2020-13800, CVE-2020-14415, CVE-2020-15863, CVE-2020-16092
Package Information: https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.4 https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.31 https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.45
--qgvOAvxj4T4yKlnkZM4FvHHcpuU5dVa0w--
--vUnYRpwM3vSy95UF4mt1GYdMn5cKCxCzP Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl89XP4ACgkQZWnYVadE vpMd1hAAvG8V1A+mnqWO+LchsfdG5N3g924Dcq1nxSmxW1RxO1n4GZ02W0MPC/If jp/8RP86QCYWyWU/AQ5QA4pw+4K2e5XrzXQI/402ebpgZwnQ53K29GIJXB0SwskP ICCdvuDDcv64QW2iHsj0RrS7mR//iL4djtadyA3r54YLGw2++VUwwRScT0I3qkVz Ykcw2RjaWoc84byPX2f2DKjB05uRJVWpxrt3pIhNtFJmb8rAvE30nxnDcmhxS6wh Vhjaa4+AIdpuaGP5g5SLD55A5DFXqx3xjEg5+2nMQyk+65qb2VEWpRZLPGlDi64g sMffPv12uoWNGZGddpP09bkWd0FES45szx95hkKAFmj4isewD7TrTM1WJ/pkSUE9 HPOBLdEjC5uxgwlRQtgAXoyaef5vpmgVOdUUI0u4GsntSaMg6UWujd+5scF/kqPe 810EEOVjHethT9HbLQ4bX2uHr77lQndqb+FSf7mtH94Syj9XMVoXYBOHzDy/sJ1l h9Z7X2HoI128icIKa7nhMe+c15i0WgQ+o6+etRcO3HSBjXULISq0cgSASY9yP317 RQ5XRlLIM1ZQQ5JcTU5ICepUZZ+i1EfRzozomThCDyJcyBgQVV0Wd6NVXrZZanRr vUOuUgMvLYh6EpoEmfOsDhS6hujvgGs0ZeaQ2GRT4+owBjh3+hw= =980k -----END PGP SIGNATURE-----
--vUnYRpwM3vSy95UF4mt1GYdMn5cKCxCzP--
--===============0613821080686751353== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============0613821080686751353==--
|