USN-4467-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4467-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4467-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4467-1
Related
Published
2020-08-19T17:01:47.836105Z
Modified
2020-08-19T17:01:47.836105Z
Summary
qemu vulnerabilities
Details

Ziming Zhang and VictorV discovered that the QEMU SLiRP networking implementation incorrectly handled replying to certain ICMP echo requests. An attacker inside a guest could possibly use this issue to leak host memory to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS. (CVE-2020-10756)

Eric Blake and Xueqiang Wei discovered that the QEMU NDB implementation incorrectly handled certain requests. A remote attacker could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-10761)

Ziming Zhang discovered that the QEMU SM501 graphics driver incorrectly handled certain operations. An attacker inside a guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-12829)

It was discovered that the QEMU SD memory card implementation incorrectly handled certain memory operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13253)

Ren Ding and Hanqing Zhao discovered that the QEMU ES1370 audio driver incorrectly handled certain invalid frame counts. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13361)

Ren Ding and Hanqing Zhao discovered that the QEMU MegaRAID SAS SCSI driver incorrectly handled certain memory operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13362)

Alexander Bulekov discovered that QEMU MegaRAID SAS SCSI driver incorrectly handled certain memory space operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13659)

Ren Ding, Hanqing Zhao, Alexander Bulekov, and Anatoly Trosinenko discovered that the QEMU incorrectly handled certain msi-x mmio operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13754)

It was discovered that QEMU incorrectly handled certain memory copy operations when loading ROM contents. If a user were tricked into running an untrusted kernel image, a remote attacker could possibly use this issue to run arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-13765)

Ren Ding, Hanqing Zhao, and Yi Ren discovered that the QEMU ATI video driver incorrectly handled certain index values. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-13800)

Ziming Zhang discovered that the QEMU OSS audio driver incorrectly handled certain operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-14415)

Ziming Zhang discovered that the QEMU XGMAC Ethernet controller incorrectly handled packet transmission. An attacker inside a guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-15863)

Ziming Zhang discovered that the QEMU e1000e Ethernet controller incorrectly handled packet processing. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-16092)

References

Affected packages

Ubuntu:20.04:LTS / qemu

Package

Name
qemu

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2-3ubuntu6.4

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "qemu-system-misc": "1:4.2-3ubuntu6.4",
            "qemu-system": "1:4.2-3ubuntu6.4",
            "qemu-system-x86-microvm": "1:4.2-3ubuntu6.4",
            "qemu-utils": "1:4.2-3ubuntu6.4",
            "qemu-user": "1:4.2-3ubuntu6.4",
            "qemu-guest-agent": "1:4.2-3ubuntu6.4",
            "qemu-kvm": "1:4.2-3ubuntu6.4",
            "qemu-block-extra": "1:4.2-3ubuntu6.4",
            "qemu-user-static": "1:4.2-3ubuntu6.4",
            "qemu-system-arm": "1:4.2-3ubuntu6.4",
            "qemu-system-x86": "1:4.2-3ubuntu6.4",
            "qemu-system-ppc": "1:4.2-3ubuntu6.4",
            "qemu-system-s390x": "1:4.2-3ubuntu6.4",
            "qemu": "1:4.2-3ubuntu6.4",
            "qemu-system-common": "1:4.2-3ubuntu6.4",
            "qemu-system-x86-xen": "1:4.2-3ubuntu6.4",
            "qemu-system-sparc": "1:4.2-3ubuntu6.4",
            "qemu-system-data": "1:4.2-3ubuntu6.4",
            "qemu-system-gui": "1:4.2-3ubuntu6.4",
            "qemu-system-mips": "1:4.2-3ubuntu6.4",
            "qemu-user-binfmt": "1:4.2-3ubuntu6.4"
        }
    ]
}

Ubuntu:18.04:LTS / qemu

Package

Name
qemu

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.11+dfsg-1ubuntu7.31

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "qemu-system-misc": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-guest-agent": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-utils": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-user": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-kvm": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-block-extra": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-user-static": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-arm": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-x86": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-ppc": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-s390x": "1:2.11+dfsg-1ubuntu7.31",
            "qemu": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-common": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-sparc": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-system-mips": "1:2.11+dfsg-1ubuntu7.31",
            "qemu-user-binfmt": "1:2.11+dfsg-1ubuntu7.31"
        }
    ]
}

Ubuntu:16.04:LTS / qemu

Package

Name
qemu

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.5+dfsg-5ubuntu10.45

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "qemu-system-misc": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-guest-agent": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-utils": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-user": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-kvm": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-block-extra": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-user-static": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-arm": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-aarch64": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-x86": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-ppc": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-s390x": "1:2.5+dfsg-5ubuntu10.45",
            "qemu": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-common": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-sparc": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-system-mips": "1:2.5+dfsg-5ubuntu10.45",
            "qemu-user-binfmt": "1:2.5+dfsg-5ubuntu10.45"
        }
    ]
}