First published: Tue Jun 12 2018(Updated: )
Ken Johnson and Jann Horn independently discovered that microprocessors utilizing speculative execution of a memory read may allow unauthorized memory reads via sidechannel attacks. An attacker in the guest could use this to expose sensitive guest information, including kernel memory. This update allows QEMU to expose new CPU features added by AMD microcode updates to guests on amd64 and i386.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/qemu | <1:2.11+dfsg-1ubuntu7.3 | 1:2.11+dfsg-1ubuntu7.3 |
=18.04 | ||
All of | ||
ubuntu/qemu-system | <1:2.11+dfsg-1ubuntu7.3 | 1:2.11+dfsg-1ubuntu7.3 |
=18.04 | ||
All of | ||
ubuntu/qemu-system-x86 | <1:2.11+dfsg-1ubuntu7.3 | 1:2.11+dfsg-1ubuntu7.3 |
=18.04 | ||
All of | ||
ubuntu/qemu | <1:2.10+dfsg-0ubuntu3.8 | 1:2.10+dfsg-0ubuntu3.8 |
=17.10 | ||
All of | ||
ubuntu/qemu-system | <1:2.10+dfsg-0ubuntu3.8 | 1:2.10+dfsg-0ubuntu3.8 |
=17.10 | ||
All of | ||
ubuntu/qemu-system-x86 | <1:2.10+dfsg-0ubuntu3.8 | 1:2.10+dfsg-0ubuntu3.8 |
=17.10 | ||
All of | ||
ubuntu/qemu | <1:2.5+dfsg-5ubuntu10.30 | 1:2.5+dfsg-5ubuntu10.30 |
=16.04 | ||
All of | ||
ubuntu/qemu-system | <1:2.5+dfsg-5ubuntu10.30 | 1:2.5+dfsg-5ubuntu10.30 |
=16.04 | ||
All of | ||
ubuntu/qemu-system-x86 | <1:2.5+dfsg-5ubuntu10.30 | 1:2.5+dfsg-5ubuntu10.30 |
=16.04 | ||
All of | ||
ubuntu/qemu | <2.0.0+dfsg-2ubuntu1.43 | 2.0.0+dfsg-2ubuntu1.43 |
=14.04 | ||
All of | ||
ubuntu/qemu-system | <2.0.0+dfsg-2ubuntu1.43 | 2.0.0+dfsg-2ubuntu1.43 |
=14.04 | ||
All of | ||
ubuntu/qemu-system-x86 | <2.0.0+dfsg-2ubuntu1.43 | 2.0.0+dfsg-2ubuntu1.43 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability addressed in USN-3679-1 is CVE-2018-3639, which allows for unauthorized memory reads via sidechannel attacks in microprocessors utilizing speculative execution of a memory read.
An attacker in the guest could use the vulnerability in USN-3679-1 to expose sensitive guest information, including kernel memory.
USN-3679-1 affects QEMU versions 1:2.11+dfsg-1ubuntu7.3, 1:2.10+dfsg-0ubuntu3.8, 1:2.5+dfsg-5ubuntu10.30, and 2.0.0+dfsg-2ubuntu1.43.
To fix the vulnerability in USN-3679-1, update QEMU to version 1:2.11+dfsg-1ubuntu7.3, 1:2.10+dfsg-0ubuntu3.8, 1:2.5+dfsg-5ubuntu10.30, or 2.0.0+dfsg-2ubuntu1.43, depending on the affected version.
More information about USN-3679-1 can be found at the following references: [CVE-2018-3639](https://ubuntu.com/security/CVE-2018-3639), [USN-3653-1](https://ubuntu.com/security/notices/USN-3653-1), [USN-3655-1](https://ubuntu.com/security/notices/USN-3655-1).