USN-5307-1

Source
https://ubuntu.com/security/notices/USN-5307-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5307-1.json
Related
Published
2022-02-28T13:03:07.827573Z
Modified
2022-02-28T13:03:07.827573Z
Summary
qemu vulnerabilities
Details

Gaoning Pan discovered that QEMU incorrectly handled the floppy disk emulator. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2021-20196)

Gaoning Pan discovered that the QEMU vmxnet3 NIC emulator incorrectly handled certain values. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2021-20203)

It was discovered that the QEMU vhost-user GPU device contained several security issues. An attacker inside the guest could use these issues to cause QEMU to crash, resulting in a denial of service, leak sensitive information, or possibly execute arbitrary code. This issue only affected Ubuntu 21.10. (CVE-2021-3544, CVE-2021-3545, CVE-2021-3546)

It was discovered that QEMU incorrectly handled bulk transfers from SPICE clients. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-3682)

It was discovered that the QEMU UAS device emulation incorrectly handled certain stream numbers. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 21.10. (CVE-2021-3713)

It was discovered that the QEMU virtio-net device incorrectly handled certain buffer addresses. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-3748)

It was discovered that the QEMU SCSI device emulation incorrectly handled certain MODE SELECT commands. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2021-3930)

It was discovered that the QEMU ACPI logic incorrectly handled certain values. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 21.10. (CVE-2021-4158)

Jietao Xiao, Jinku Li, Wenbo Shen, and Nanzi Yang discovered that the QEMU virtiofsd device incorrectly handled permissions when creating files. An attacker inside the guest could use this issue to create files inside the directory shared by virtiofs with unintended permissions, possibly allowing privilege escalation. This issue only affected Ubuntu 21.10. (CVE-2022-0358)

References

Affected packages

Ubuntu:20.04:LTS / qemu

Package

Name
qemu

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1:4.2-3ubuntu6.21

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "qemu-system-misc": "1:4.2-3ubuntu6.21",
            "qemu-system": "1:4.2-3ubuntu6.21",
            "qemu-system-x86-microvm": "1:4.2-3ubuntu6.21",
            "qemu-utils": "1:4.2-3ubuntu6.21",
            "qemu-user": "1:4.2-3ubuntu6.21",
            "qemu-guest-agent": "1:4.2-3ubuntu6.21",
            "qemu-kvm": "1:4.2-3ubuntu6.21",
            "qemu-block-extra": "1:4.2-3ubuntu6.21",
            "qemu-user-static": "1:4.2-3ubuntu6.21",
            "qemu-system-arm": "1:4.2-3ubuntu6.21",
            "qemu-system-x86": "1:4.2-3ubuntu6.21",
            "qemu-system-ppc": "1:4.2-3ubuntu6.21",
            "qemu-system-s390x": "1:4.2-3ubuntu6.21",
            "qemu": "1:4.2-3ubuntu6.21",
            "qemu-system-common": "1:4.2-3ubuntu6.21",
            "qemu-system-x86-xen": "1:4.2-3ubuntu6.21",
            "qemu-system-sparc": "1:4.2-3ubuntu6.21",
            "qemu-system-data": "1:4.2-3ubuntu6.21",
            "qemu-system-gui": "1:4.2-3ubuntu6.21",
            "qemu-system-mips": "1:4.2-3ubuntu6.21",
            "qemu-user-binfmt": "1:4.2-3ubuntu6.21"
        }
    ]
}

Ubuntu:18.04:LTS / qemu

Package

Name
qemu

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1:2.11+dfsg-1ubuntu7.39

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "qemu-system-misc": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-guest-agent": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-utils": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-user": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-kvm": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-block-extra": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-user-static": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-arm": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-x86": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-ppc": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-s390x": "1:2.11+dfsg-1ubuntu7.39",
            "qemu": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-common": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-sparc": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-system-mips": "1:2.11+dfsg-1ubuntu7.39",
            "qemu-user-binfmt": "1:2.11+dfsg-1ubuntu7.39"
        }
    ]
}