USN-2692-1: QEMU vulnerabilities

Ubuntu Security Notice USN-2692-1

28th July, 2015

qemu vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in QEMU.

Software description

  • qemu
    – Machine emulator and virtualizer

Details

Matt Tait discovered that QEMU incorrectly handled PIT emulation. In a
non-default configuration, a malicious guest could use this issue to cause
a denial of service, or possibly execute arbitrary code on the host as the
user running the QEMU process. In the default installation, when QEMU is
used with libvirt, attackers would be isolated by the libvirt AppArmor
profile. (CVE-2015-3214)

Kevin Wolf discovered that QEMU incorrectly handled processing ATAPI
commands. A malicious guest could use this issue to cause a denial of
service, or possibly execute arbitrary code on the host as the user running
the QEMU process. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2015-5154)

Zhu Donghai discovered that QEMU incorrectly handled the SCSI driver. A
malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile. This issue
only affected Ubuntu 15.04. (CVE-2015-5158)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
qemu-system-misc

1:2.2+dfsg-5expubuntu9.3
qemu-system

1:2.2+dfsg-5expubuntu9.3
qemu-system-aarch64

1:2.2+dfsg-5expubuntu9.3
qemu-system-x86

1:2.2+dfsg-5expubuntu9.3
qemu-system-sparc

1:2.2+dfsg-5expubuntu9.3
qemu-system-arm

1:2.2+dfsg-5expubuntu9.3
qemu-system-ppc

1:2.2+dfsg-5expubuntu9.3
qemu-system-mips

1:2.2+dfsg-5expubuntu9.3
Ubuntu 14.04 LTS:
qemu-system-misc

2.0.0+dfsg-2ubuntu1.15
qemu-system

2.0.0+dfsg-2ubuntu1.15
qemu-system-aarch64

2.0.0+dfsg-2ubuntu1.15
qemu-system-x86

2.0.0+dfsg-2ubuntu1.15
qemu-system-sparc

2.0.0+dfsg-2ubuntu1.15
qemu-system-arm

2.0.0+dfsg-2ubuntu1.15
qemu-system-ppc

2.0.0+dfsg-2ubuntu1.15
qemu-system-mips

2.0.0+dfsg-2ubuntu1.15

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References

CVE-2015-3214,

CVE-2015-5154,

CVE-2015-5158

Leave a Reply