what you don't know can hurt you

Ubuntu Security Notice USN-4650-1

Ubuntu Security Notice USN-4650-1
Posted Nov 30, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4650-1 - Alexander Bulekov discovered that QEMU incorrectly handled SDHCI device emulation. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU incorrectly handled USB device emulation. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-17380, CVE-2020-25084, CVE-2020-25085, CVE-2020-25624, CVE-2020-25625, CVE-2020-25723, CVE-2020-27616, CVE-2020-27617
MD5 | 637bf499dd94b75eea9e3371d70add3a

Ubuntu Security Notice USN-4650-1

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-4650-1
November 30, 2020

qemu vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
- qemu: Machine emulator and virtualizer

Details:

Alexander Bulekov discovered that QEMU incorrectly handled SDHCI device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code on the host. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2020-17380)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled USB device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25084)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled SDHCI device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25085)

Gaoning Pan, Yongkang Jia, and Yi Ren discovered that QEMU incorrectly
handled USB device emulation. An attacker inside the guest could use this
issue to cause QEMU to crash, resulting in a denial of service.
(CVE-2020-25624)

It was discovered that QEMU incorrectly handled USB device emulation. An
attacker inside the guest could use this issue to cause QEMU to hang,
resulting in a denial of service. (CVE-2020-25625)

Cheolwoo Myung discovered that QEMU incorrectly handled USB device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. (CVE-2020-25723)

Gaoning Pan discovered that QEMU incorrectly handled ATI graphics device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 20.10. (CVE-2020-27616)

Gaoning Pan discovered that QEMU incorrectly handled networking. An
attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. (CVE-2020-27617)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
qemu-system 1:5.0-5ubuntu9.2
qemu-system-arm 1:5.0-5ubuntu9.2
qemu-system-mips 1:5.0-5ubuntu9.2
qemu-system-misc 1:5.0-5ubuntu9.2
qemu-system-ppc 1:5.0-5ubuntu9.2
qemu-system-s390x 1:5.0-5ubuntu9.2
qemu-system-sparc 1:5.0-5ubuntu9.2
qemu-system-x86 1:5.0-5ubuntu9.2
qemu-system-x86-microvm 1:5.0-5ubuntu9.2
qemu-system-x86-xen 1:5.0-5ubuntu9.2

Ubuntu 20.04 LTS:
qemu-system 1:4.2-3ubuntu6.10
qemu-system-arm 1:4.2-3ubuntu6.10
qemu-system-mips 1:4.2-3ubuntu6.10
qemu-system-misc 1:4.2-3ubuntu6.10
qemu-system-ppc 1:4.2-3ubuntu6.10
qemu-system-s390x 1:4.2-3ubuntu6.10
qemu-system-sparc 1:4.2-3ubuntu6.10
qemu-system-x86 1:4.2-3ubuntu6.10
qemu-system-x86-microvm 1:4.2-3ubuntu6.10
qemu-system-x86-xen 1:4.2-3ubuntu6.10

Ubuntu 18.04 LTS:
qemu-system 1:2.11+dfsg-1ubuntu7.34
qemu-system-arm 1:2.11+dfsg-1ubuntu7.34
qemu-system-mips 1:2.11+dfsg-1ubuntu7.34
qemu-system-misc 1:2.11+dfsg-1ubuntu7.34
qemu-system-ppc 1:2.11+dfsg-1ubuntu7.34
qemu-system-s390x 1:2.11+dfsg-1ubuntu7.34
qemu-system-sparc 1:2.11+dfsg-1ubuntu7.34
qemu-system-x86 1:2.11+dfsg-1ubuntu7.34

Ubuntu 16.04 LTS:
qemu-system 1:2.5+dfsg-5ubuntu10.48
qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.48
qemu-system-arm 1:2.5+dfsg-5ubuntu10.48
qemu-system-mips 1:2.5+dfsg-5ubuntu10.48
qemu-system-misc 1:2.5+dfsg-5ubuntu10.48
qemu-system-ppc 1:2.5+dfsg-5ubuntu10.48
qemu-system-s390x 1:2.5+dfsg-5ubuntu10.48
qemu-system-sparc 1:2.5+dfsg-5ubuntu10.48
qemu-system-x86 1:2.5+dfsg-5ubuntu10.48

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://usn.ubuntu.com/4650-1
CVE-2020-17380, CVE-2020-25084, CVE-2020-25085, CVE-2020-25624,
CVE-2020-25625, CVE-2020-25723, CVE-2020-27616, CVE-2020-27617

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:5.0-5ubuntu9.2
https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.10
https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.34
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.48
Login or Register to add favorites

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close