USN-2439-1: QEMU vulnerabilities
11 December 2014
Several security issues were fixed in QEMU.
Releases
Packages
Details
Michael S. Tsirkin discovered that QEMU incorrectly handled certain
parameters during ram load while performing a migration. An attacker able
to manipulate savevm data could use this issue to possibly execute
arbitrary code on the host. This issue only affected Ubuntu 12.04 LTS,
Ubuntu 14.04 LTS, and Ubuntu 14.10. (CVE-2014-7840)
Paolo Bonzini discovered that QEMU incorrectly handled memory in the Cirrus
VGA device. A malicious guest could possibly use this issue to write into
memory of the host, leading to privilege escalation. (CVE-2014-8106)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10
-
qemu-system
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-aarch64
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-arm
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-mips
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-misc
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-ppc
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-sparc
-
2.1+dfsg-4ubuntu6.3
-
qemu-system-x86
-
2.1+dfsg-4ubuntu6.3
Ubuntu 14.04
-
qemu-system
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-aarch64
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-arm
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-mips
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-misc
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-ppc
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-sparc
-
2.0.0+dfsg-2ubuntu1.9
-
qemu-system-x86
-
2.0.0+dfsg-2ubuntu1.9
Ubuntu 12.04
Ubuntu 10.04
After a standard system update you need to reboot your computer to make
all the necessary changes.