USN-4650-1: QEMU vulnerabilities

Publication date

30 November 2020

Overview

Several security issues were fixed in QEMU.


Packages

  • qemu - Machine emulator and virtualizer

Details

Alexander Bulekov discovered that QEMU incorrectly handled SDHCI device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code on the host. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2020-17380)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled USB device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25084)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled SDHCI device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (

Alexander Bulekov discovered that QEMU incorrectly handled SDHCI device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code on the host. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2020-17380)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled USB device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25084)

Sergej Schumilo, Cornelius Aschermann, and Simon Wrner discovered that QEMU
incorrectly handled SDHCI device emulation. An attacker inside the guest
could use this issue to cause QEMU to crash, resulting in a denial of
service. (CVE-2020-25085)

Gaoning Pan, Yongkang Jia, and Yi Ren discovered that QEMU incorrectly
handled USB device emulation. An attacker inside the guest could use this
issue to cause QEMU to crash, resulting in a denial of service.
(CVE-2020-25624)

It was discovered that QEMU incorrectly handled USB device emulation. An
attacker inside the guest could use this issue to cause QEMU to hang,
resulting in a denial of service. (CVE-2020-25625)

Cheolwoo Myung discovered that QEMU incorrectly handled USB device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. (CVE-2020-25723)

Gaoning Pan discovered that QEMU incorrectly handled ATI graphics device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 20.10. (CVE-2020-27616)

Gaoning Pan discovered that QEMU incorrectly handled networking. An
attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. (CVE-2020-27617)


Update instructions

After a standard system update you need to restart all QEMU virtual machines to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.10 groovy qemu-system –  1:5.0-5ubuntu9.2
qemu-system-arm –  1:5.0-5ubuntu9.2
qemu-system-mips –  1:5.0-5ubuntu9.2
qemu-system-misc –  1:5.0-5ubuntu9.2
qemu-system-ppc –  1:5.0-5ubuntu9.2
qemu-system-s390x –  1:5.0-5ubuntu9.2
qemu-system-sparc –  1:5.0-5ubuntu9.2
qemu-system-x86 –  1:5.0-5ubuntu9.2
qemu-system-x86-microvm –  1:5.0-5ubuntu9.2
qemu-system-x86-xen –  1:5.0-5ubuntu9.2
20.04 focal qemu-system –  1:4.2-3ubuntu6.10
qemu-system-arm –  1:4.2-3ubuntu6.10
qemu-system-mips –  1:4.2-3ubuntu6.10
qemu-system-misc –  1:4.2-3ubuntu6.10
qemu-system-ppc –  1:4.2-3ubuntu6.10
qemu-system-s390x –  1:4.2-3ubuntu6.10
qemu-system-sparc –  1:4.2-3ubuntu6.10
qemu-system-x86 –  1:4.2-3ubuntu6.10
qemu-system-x86-microvm –  1:4.2-3ubuntu6.10
qemu-system-x86-xen –  1:4.2-3ubuntu6.10
18.04 bionic qemu-system –  1:2.11+dfsg-1ubuntu7.34
qemu-system-arm –  1:2.11+dfsg-1ubuntu7.34
qemu-system-mips –  1:2.11+dfsg-1ubuntu7.34
qemu-system-misc –  1:2.11+dfsg-1ubuntu7.34
qemu-system-ppc –  1:2.11+dfsg-1ubuntu7.34
qemu-system-s390x –  1:2.11+dfsg-1ubuntu7.34
qemu-system-sparc –  1:2.11+dfsg-1ubuntu7.34
qemu-system-x86 –  1:2.11+dfsg-1ubuntu7.34
16.04 xenial qemu-system –  1:2.5+dfsg-5ubuntu10.48
qemu-system-aarch64 –  1:2.5+dfsg-5ubuntu10.48
qemu-system-arm –  1:2.5+dfsg-5ubuntu10.48
qemu-system-mips –  1:2.5+dfsg-5ubuntu10.48
qemu-system-misc –  1:2.5+dfsg-5ubuntu10.48
qemu-system-ppc –  1:2.5+dfsg-5ubuntu10.48
qemu-system-s390x –  1:2.5+dfsg-5ubuntu10.48
qemu-system-sparc –  1:2.5+dfsg-5ubuntu10.48
qemu-system-x86 –  1:2.5+dfsg-5ubuntu10.48

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›