Advisory Published

USN-3414-1: QEMU vulnerabilities

First published: Wed Sep 13 2017(Updated: )

Leo Gaspard discovered that QEMU incorrectly handled VirtFS access control. A guest attacker could use this issue to elevate privileges inside the guest. (CVE-2017-7493) Li Qiang discovered that QEMU incorrectly handled VMWare PVSCSI emulation. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources or crash, resulting in a denial of service. (CVE-2017-8112) It was discovered that QEMU incorrectly handled MegaRAID SAS 8708EM2 Host Bus Adapter emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly to obtain sensitive host memory. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.04. (CVE-2017-8380) Li Qiang discovered that QEMU incorrectly handled the Virtio GPU device. An attacker inside the guest could use this issue to cause QEMU to consume resources and crash, resulting in a denial of service. This issue only affected Ubuntu 17.04. (CVE-2017-9060) Li Qiang discovered that QEMU incorrectly handled the e1000e device. A privileged attacker inside the guest could use this issue to cause QEMU to hang, resulting in a denial of service. This issue only affected Ubuntu 17.04. (CVE-2017-9310) Li Qiang discovered that QEMU incorrectly handled USB OHCI emulation support. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-9330) Li Qiang discovered that QEMU incorrectly handled IDE AHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources and crash, resulting in a denial of service. (CVE-2017-9373) Li Qiang discovered that QEMU incorrectly handled USB EHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources and crash, resulting in a denial of service. (CVE-2017-9374) Li Qiang discovered that QEMU incorrectly handled USB xHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to hang, resulting in a denial of service. (CVE-2017-9375) Zhangyanyu discovered that QEMU incorrectly handled MegaRAID SAS 8708EM2 Host Bus Adapter emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-9503) It was discovered that the QEMU qemu-nbd server incorrectly handled initialization. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2017-9524) It was discovered that the QEMU qemu-nbd server incorrectly handled signals. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2017-10664) Li Qiang discovered that the QEMU USB redirector incorrectly handled logging debug messages. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-10806) Anthony Perard discovered that QEMU incorrectly handled Xen block-interface responses. An attacker inside the guest could use this issue to cause QEMU to leak contents of host memory. (CVE-2017-10911) Reno Robert discovered that QEMU incorrectly handled certain DHCP options strings. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2017-11434) Ryan Salsamendi discovered that QEMU incorrectly handled empty CDROM device drives. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.04. (CVE-2017-12809)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/qemu-system<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-aarch64<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-arm<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-mips<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-misc<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-ppc<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-s390x<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-sparc<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system-x86<1:2.8+dfsg-3ubuntu2.4
1:2.8+dfsg-3ubuntu2.4
=17.04
All of
ubuntu/qemu-system<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-aarch64<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-arm<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-mips<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-misc<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-ppc<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-s390x<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-sparc<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system-x86<1:2.5+dfsg-5ubuntu10.15
1:2.5+dfsg-5ubuntu10.15
=16.04
All of
ubuntu/qemu-system<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-aarch64<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-arm<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-mips<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-misc<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-ppc<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-sparc<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04
All of
ubuntu/qemu-system-x86<2.0.0+dfsg-2ubuntu1.35
2.0.0+dfsg-2ubuntu1.35
=14.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability in USN-3414-1?

    QEMU vulnerabilities in VirtFS access control and VMWare PVSCSI emulation.

  • How can an attacker exploit the vulnerability in USN-3414-1?

    A guest attacker could elevate privileges inside the guest.

  • What versions of QEMU are affected by the vulnerability in USN-3414-1?

    Versions 2.8 and 2.5 of QEMU are affected.

  • How do I fix the vulnerability in USN-3414-1?

    Upgrade to QEMU version 1:2.8+dfsg-3ubuntu2.4 on Ubuntu 17.04, or version 1:2.5+dfsg-5ubuntu10.15 on Ubuntu 16.04, or version 2.0.0+dfsg-2ubuntu1.35 on Ubuntu 14.04.

  • Where can I find more information about the vulnerability in USN-3414-1?

    You can find more information about the vulnerability in USN-3414-1 on the Ubuntu Security website.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203