Debian Security Advisory
DSA-4213-1 qemu -- security update
- Date Reported:
- 29 May 2018
- Affected Packages:
- qemu
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 877890, Bug 880832, Bug 880836, Bug 882136, Bug 883399, Bug 883625, Bug 884806, Bug 886532.
In Mitre's CVE dictionary: CVE-2017-5715, CVE-2017-15038, CVE-2017-15119, CVE-2017-15124, CVE-2017-15268, CVE-2017-15289, CVE-2017-16845, CVE-2017-17381, CVE-2017-18043, CVE-2018-5683, CVE-2018-7550. - More information:
-
Several vulnerabilities were discovered in qemu, a fast processor emulator.
- CVE-2017-15038
Tuomas Tynkkynen discovered an information leak in 9pfs.
- CVE-2017-15119
Eric Blake discovered that the NBD server insufficiently restricts large option requests, resulting in denial of service.
- CVE-2017-15124
Daniel Berrange discovered that the integrated VNC server insufficiently restricted memory allocation, which could result in denial of service.
- CVE-2017-15268
A memory leak in websockets support may result in denial of service.
- CVE-2017-15289
Guoxiang Niu discovered an OOB write in the emulated Cirrus graphics adaptor which could result in denial of service.
- CVE-2017-16845
Cyrille Chatras discovered an information leak in PS/2 mouse and keyboard emulation which could be exploited during instance migration.
- CVE-2017-17381
Dengzhan Heyuandong Bijunhua and Liweichao discovered that an implementation error in the virtio vring implementation could result in denial of service.
- CVE-2017-18043
Eric Blake discovered an integer overflow in an internally used macro which could result in denial of service.
- CVE-2018-5683
Jiang Xin and Lin ZheCheng discovered an OOB memory access in the emulated VGA adaptor which could result in denial of service.
- CVE-2018-7550
Cyrille Chatras discovered that an OOB memory write when using multiboot could result in the execution of arbitrary code.
This update also backports a number of mitigations against the Spectre v2 vulnerability affecting modern CPUs (CVE-2017-5715). For additional information please refer to https://www.qemu.org/2018/01/04/spectre/
For the stable distribution (stretch), these problems have been fixed in version 1:2.8+dfsg-6+deb9u4.
We recommend that you upgrade your qemu packages.
For the detailed security status of qemu please refer to its security tracker page at: https://security-tracker.debian.org/tracker/qemu
- CVE-2017-15038