|
|
Subscribe / Log in / New account

Ubuntu alert USN-2182-1 (qemu, qemu-kvm)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2182-1] QEMU vulnerabilities
Date:  Mon, 28 Apr 2014 09:31:25 -0400
Message-ID:  <535E582D.3010702@canonical.com>

========================================================================== Ubuntu Security Notice USN-2182-1 April 28, 2014 qemu, qemu-kvm vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in QEMU. Software Description: - qemu: Machine emulator and virtualizer - qemu-kvm: Machine emulator and virtualizer Details: Michael S. Tsirkin discovered that QEMU incorrectly handled vmxnet3 devices. A local guest could possibly use this issue to cause a denial of service, or possibly execute arbitrary code on the host. This issue only applied to Ubuntu 13.10 and Ubuntu 14.04 LTS. (CVE-2013-4544) Michael S. Tsirkin discovered that QEMU incorrectly handled virtio-net MAC addresses. A local guest could possibly use this issue to cause a denial of service, or possibly execute arbitrary code on the host. (CVE-2014-0150) BenoƮt Canet discovered that QEMU incorrectly handled SMART self-tests. A local guest could possibly use this issue to cause a denial of service, or possibly execute arbitrary code on the host. (CVE-2014-2894) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: qemu-system 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-aarch64 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-arm 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-mips 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-misc 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-ppc 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-sparc 2.0.0~rc1+dfsg-0ubuntu3.1 qemu-system-x86 2.0.0~rc1+dfsg-0ubuntu3.1 Ubuntu 13.10: qemu-system 1.5.0+dfsg-3ubuntu5.4 qemu-system-arm 1.5.0+dfsg-3ubuntu5.4 qemu-system-mips 1.5.0+dfsg-3ubuntu5.4 qemu-system-misc 1.5.0+dfsg-3ubuntu5.4 qemu-system-ppc 1.5.0+dfsg-3ubuntu5.4 qemu-system-sparc 1.5.0+dfsg-3ubuntu5.4 qemu-system-x86 1.5.0+dfsg-3ubuntu5.4 Ubuntu 12.10: qemu-kvm 1.2.0+noroms-0ubuntu2.12.10.7 Ubuntu 12.04 LTS: qemu-kvm 1.0+noroms-0ubuntu14.14 Ubuntu 10.04 LTS: qemu-kvm 0.12.3+noroms-0ubuntu9.22 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2182-1 CVE-2013-4544, CVE-2014-0150, CVE-2014-2894 Package Information: https://launchpad.net/ubuntu/+source/qemu/2.0.0~rc1+dfsg-... https://launchpad.net/ubuntu/+source/qemu/1.5.0+dfsg-3ubu... https://launchpad.net/ubuntu/+source/qemu-kvm/1.2.0+norom... https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-... https://launchpad.net/ubuntu/+source/qemu-kvm/0.12.3+noro... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds