USN-3414-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3414-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3414-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3414-1
Related
Published
2017-09-13T11:58:25.128173Z
Modified
2017-09-13T11:58:25.128173Z
Summary
qemu vulnerabilities
Details

Leo Gaspard discovered that QEMU incorrectly handled VirtFS access control. A guest attacker could use this issue to elevate privileges inside the guest. (CVE-2017-7493)

Li Qiang discovered that QEMU incorrectly handled VMWare PVSCSI emulation. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources or crash, resulting in a denial of service. (CVE-2017-8112)

It was discovered that QEMU incorrectly handled MegaRAID SAS 8708EM2 Host Bus Adapter emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly to obtain sensitive host memory. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.04. (CVE-2017-8380)

Li Qiang discovered that QEMU incorrectly handled the Virtio GPU device. An attacker inside the guest could use this issue to cause QEMU to consume resources and crash, resulting in a denial of service. This issue only affected Ubuntu 17.04. (CVE-2017-9060)

Li Qiang discovered that QEMU incorrectly handled the e1000e device. A privileged attacker inside the guest could use this issue to cause QEMU to hang, resulting in a denial of service. This issue only affected Ubuntu 17.04. (CVE-2017-9310)

Li Qiang discovered that QEMU incorrectly handled USB OHCI emulation support. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-9330)

Li Qiang discovered that QEMU incorrectly handled IDE AHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources and crash, resulting in a denial of service. (CVE-2017-9373)

Li Qiang discovered that QEMU incorrectly handled USB EHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources and crash, resulting in a denial of service. (CVE-2017-9374)

Li Qiang discovered that QEMU incorrectly handled USB xHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to hang, resulting in a denial of service. (CVE-2017-9375)

Zhangyanyu discovered that QEMU incorrectly handled MegaRAID SAS 8708EM2 Host Bus Adapter emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-9503)

It was discovered that the QEMU qemu-nbd server incorrectly handled initialization. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2017-9524)

It was discovered that the QEMU qemu-nbd server incorrectly handled signals. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2017-10664)

Li Qiang discovered that the QEMU USB redirector incorrectly handled logging debug messages. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-10806)

Anthony Perard discovered that QEMU incorrectly handled Xen block-interface responses. An attacker inside the guest could use this issue to cause QEMU to leak contents of host memory. (CVE-2017-10911)

Reno Robert discovered that QEMU incorrectly handled certain DHCP options strings. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-11434)

Ryan Salsamendi discovered that QEMU incorrectly handled empty CDROM device drives. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.04. (CVE-2017-12809)

References

Affected packages

Ubuntu:14.04:LTS / qemu

Package

Name
qemu
Purl
pkg:deb/ubuntu/qemu@2.0.0+dfsg-2ubuntu1.35?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0+dfsg-2ubuntu1.35

Affected versions

1.*

1.5.0+dfsg-3ubuntu5
1.5.0+dfsg-3ubuntu6
1.6.0+dfsg-2ubuntu1
1.6.0+dfsg-2ubuntu2
1.6.0+dfsg-2ubuntu3
1.6.0+dfsg-2ubuntu4
1.7.0+dfsg-2ubuntu1
1.7.0+dfsg-2ubuntu2
1.7.0+dfsg-2ubuntu3
1.7.0+dfsg-2ubuntu4
1.7.0+dfsg-2ubuntu5
1.7.0+dfsg-2ubuntu7
1.7.0+dfsg-2ubuntu8
1.7.0+dfsg-2ubuntu9
1.7.0+dfsg-3ubuntu1~ppa1
1.7.0+dfsg-3ubuntu1
1.7.0+dfsg-3ubuntu2
1.7.0+dfsg-3ubuntu3
1.7.0+dfsg-3ubuntu4
1.7.0+dfsg-3ubuntu5
1.7.0+dfsg-3ubuntu6
1.7.0+dfsg-3ubuntu7

2.*

2.0.0~rc1+dfsg-0ubuntu1
2.0.0~rc1+dfsg-0ubuntu2
2.0.0~rc1+dfsg-0ubuntu3
2.0.0~rc1+dfsg-0ubuntu3.1
2.0.0+dfsg-2ubuntu1
2.0.0+dfsg-2ubuntu1.1
2.0.0+dfsg-2ubuntu1.2
2.0.0+dfsg-2ubuntu1.3
2.0.0+dfsg-2ubuntu1.5
2.0.0+dfsg-2ubuntu1.6
2.0.0+dfsg-2ubuntu1.7
2.0.0+dfsg-2ubuntu1.8
2.0.0+dfsg-2ubuntu1.9
2.0.0+dfsg-2ubuntu1.10
2.0.0+dfsg-2ubuntu1.11
2.0.0+dfsg-2ubuntu1.13
2.0.0+dfsg-2ubuntu1.14
2.0.0+dfsg-2ubuntu1.15
2.0.0+dfsg-2ubuntu1.16
2.0.0+dfsg-2ubuntu1.17
2.0.0+dfsg-2ubuntu1.18
2.0.0+dfsg-2ubuntu1.19
2.0.0+dfsg-2ubuntu1.20
2.0.0+dfsg-2ubuntu1.21
2.0.0+dfsg-2ubuntu1.22
2.0.0+dfsg-2ubuntu1.24
2.0.0+dfsg-2ubuntu1.25
2.0.0+dfsg-2ubuntu1.26
2.0.0+dfsg-2ubuntu1.27
2.0.0+dfsg-2ubuntu1.28
2.0.0+dfsg-2ubuntu1.29
2.0.0+dfsg-2ubuntu1.30
2.0.0+dfsg-2ubuntu1.31
2.0.0+dfsg-2ubuntu1.32
2.0.0+dfsg-2ubuntu1.33
2.0.0+dfsg-2ubuntu1.34

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "qemu-system-misc": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-guest-agent-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-arm-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-utils-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-user": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-kvm": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-ppc-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-aarch64": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-user-static": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-arm": "2.0.0+dfsg-2ubuntu1.35",
            "qemu": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-sparc": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-common-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-common": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-x86-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-guest-agent": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-utils": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-misc-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-sparc-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-mips-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-x86": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-ppc": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-common": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-keymaps": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-user-static-dbgsym": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-system-mips": "2.0.0+dfsg-2ubuntu1.35",
            "qemu-user-dbgsym": "2.0.0+dfsg-2ubuntu1.35"
        }
    ]
}

Ubuntu:16.04:LTS / qemu

Package

Name
qemu
Purl
pkg:deb/ubuntu/qemu@1:2.5+dfsg-5ubuntu10.15?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.5+dfsg-5ubuntu10.15

Affected versions

1:2.*

1:2.3+dfsg-5ubuntu9
1:2.3+dfsg-5ubuntu10
1:2.4+dfsg-4ubuntu1
1:2.4+dfsg-4ubuntu2
1:2.4+dfsg-4ubuntu3
1:2.4+dfsg-5ubuntu3
1:2.5+dfsg-1ubuntu2
1:2.5+dfsg-1ubuntu3
1:2.5+dfsg-1ubuntu4
1:2.5+dfsg-1ubuntu5
1:2.5+dfsg-5ubuntu1
1:2.5+dfsg-5ubuntu2
1:2.5+dfsg-5ubuntu4
1:2.5+dfsg-5ubuntu6
1:2.5+dfsg-5ubuntu7
1:2.5+dfsg-5ubuntu10
1:2.5+dfsg-5ubuntu10.1
1:2.5+dfsg-5ubuntu10.2
1:2.5+dfsg-5ubuntu10.3
1:2.5+dfsg-5ubuntu10.4
1:2.5+dfsg-5ubuntu10.5
1:2.5+dfsg-5ubuntu10.6
1:2.5+dfsg-5ubuntu10.7
1:2.5+dfsg-5ubuntu10.8
1:2.5+dfsg-5ubuntu10.9
1:2.5+dfsg-5ubuntu10.10
1:2.5+dfsg-5ubuntu10.11
1:2.5+dfsg-5ubuntu10.13
1:2.5+dfsg-5ubuntu10.14

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "qemu-system-misc": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-guest-agent-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-block-extra-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-utils-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-user": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-arm-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-kvm": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-ppc-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-aarch64": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-user-static": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-arm": "1:2.5+dfsg-5ubuntu10.15",
            "qemu": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-sparc": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-s390x-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-common-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-x86-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-guest-agent": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-utils": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-sparc-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-misc-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-block-extra": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-mips-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-x86": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-ppc": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-s390x": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-common": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-user-static-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-system-mips": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-user-dbgsym": "1:2.5+dfsg-5ubuntu10.15",
            "qemu-user-binfmt": "1:2.5+dfsg-5ubuntu10.15"
        }
    ]
}