============================================================================ Ubuntu Security Notice USN-2409-1 November 13, 2014 qemu, qemu-kvm vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in QEMU. Software Description: - qemu: Machine emulator and virtualizer - qemu-kvm: Machine emulator and virtualizer Details: Laszlo Ersek discovered that QEMU incorrectly handled memory in the vga device. A malicious guest could possibly use this issue to read arbitrary host memory. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-3615) Xavier Mehrenberger and Stephane Duverger discovered that QEMU incorrectly handled certain udp packets when using guest networking. A malicious guest could possibly use this issue to cause a denial of service. (CVE-2014-3640) It was discovered that QEMU incorrectly handled parameter validation in the vmware_vga device. A malicious guest could possibly use this issue to write into memory of the host, leading to privilege escalation. (CVE-2014-3689) It was discovered that QEMU incorrectly handled USB xHCI controller live migration. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-5263) Michael S. Tsirkin discovered that QEMU incorrectly handled memory in the ACPI PCI hotplug interface. A malicious guest could possibly use this issue to access memory of the host, leading to information disclosure or privilege escalation. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-5388) James Spadaro discovered that QEMU incorrectly handled certain VNC bytes_per_pixel values. An attacker having access to a VNC console could possibly use this issue to cause a guest to crash, resulting in a denial of service. (CVE-2014-7815) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: qemu-system 2.1+dfsg-4ubuntu6.1 qemu-system-aarch64 2.1+dfsg-4ubuntu6.1 qemu-system-arm 2.1+dfsg-4ubuntu6.1 qemu-system-mips 2.1+dfsg-4ubuntu6.1 qemu-system-misc 2.1+dfsg-4ubuntu6.1 qemu-system-ppc 2.1+dfsg-4ubuntu6.1 qemu-system-sparc 2.1+dfsg-4ubuntu6.1 qemu-system-x86 2.1+dfsg-4ubuntu6.1 Ubuntu 14.04 LTS: qemu-system 2.0.0+dfsg-2ubuntu1.7 qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.7 qemu-system-arm 2.0.0+dfsg-2ubuntu1.7 qemu-system-mips 2.0.0+dfsg-2ubuntu1.7 qemu-system-misc 2.0.0+dfsg-2ubuntu1.7 qemu-system-ppc 2.0.0+dfsg-2ubuntu1.7 qemu-system-sparc 2.0.0+dfsg-2ubuntu1.7 qemu-system-x86 2.0.0+dfsg-2ubuntu1.7 Ubuntu 12.04 LTS: qemu-kvm 1.0+noroms-0ubuntu14.19 Ubuntu 10.04 LTS: qemu-kvm 0.12.3+noroms-0ubuntu9.25 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2409-1 CVE-2014-3615, CVE-2014-3640, CVE-2014-3689, CVE-2014-5263, CVE-2014-5388, CVE-2014-7815 Package Information: https://launchpad.net/ubuntu/+source/qemu/2.1+dfsg-4ubuntu6.1 https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.7 https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.19 https://launchpad.net/ubuntu/+source/qemu-kvm/0.12.3+noroms-0ubuntu9.25