UbuntuUpdates.org

Package "qemu"

Name: qemu

Description:

fast processor emulator

Latest version: 1:2.5+dfsg-5ubuntu10.22
Release: xenial (16.04)
Level: security
Repository: universe
Homepage: http://www.qemu.org/

Links

Save this URL for the latest version of "qemu": https://www.ubuntuupdates.org/qemu


Download "qemu"


Other versions of "qemu" in Xenial

Repository Area Version
base universe 1:2.5+dfsg-5ubuntu10
base main 1:2.5+dfsg-5ubuntu10
security main 1:2.5+dfsg-5ubuntu10.22
updates main 1:2.5+dfsg-5ubuntu10.22
updates universe 1:2.5+dfsg-5ubuntu10.22

Packages in group

Deleted packages are displayed in grey.

qemu-guest-agent qemu-user qemu-user-binfmt qemu-user-static

Changelog

Version: 1:2.5+dfsg-5ubuntu10.22 2018-02-20 21:08:09 UTC

  qemu (1:2.5+dfsg-5ubuntu10.22) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS via guest ram block area
    - debian/patches/CVE-2017-11334-1.patch: use qemu_ram_ptr_length to
      access guest ram in exec.c.
    - debian/patches/CVE-2017-11334-2.patch: add lock parameter to
      qemu_ram_ptr_length in exec.c.
    - CVE-2017-11334
  * SECURITY UPDATE: code execution via multiboot out-of-bounds write
    - debian/patches/CVE-2017-14167.patch: validate multiboot header
      address values in hw/i386/multiboot.c.
    - CVE-2017-14167
  * SECURITY UPDATE: information disclosure via race in 9pfs
    - debian/patches/CVE-2017-15038.patch: use g_malloc0 to allocate space
      for xattr in hw/9pfs/virtio-9p.c.
    - CVE-2017-15038
  * SECURITY UPDATE: DoS via large option request in NBD server
    - debian/patches/CVE-2017-15119.patch: reject options larger than 32M
      in nbd.c.
    - CVE-2017-15119
  * SECURITY UPDATE: DoS in cirrus driver
    - debian/patches/CVE-2017-15289.patch: fix oob access in mode4and5
      write functions in hw/display/cirrus_vga.c.
    - CVE-2017-15289
  * SECURITY UPDATE: out-of-bounds access in ps2 driver
    - debian/patches/CVE-2017-16845.patch: check PS2Queue pointers in
      post_load routine in hw/input/ps2.c.
    - CVE-2017-16845
  * SECURITY UPDATE: DoS in Virtio Vring implementation
    - debian/patches/CVE-2017-17381.patch: check VirtQueue Vring object is
      set in hw/virtio/virtio.c.
    - CVE-2017-17381
  * SECURITY UPDATE: DoS via integer overflow in ROUND_UP
    - debian/patches/CVE-2017-18043.patch: fix ROUND_UP in
      include/qemu/osdep.h.
    - CVE-2017-18043
  * SECURITY UPDATE: DoS in VGA driver
    - debian/patches/CVE-2018-5683.patch: check the validation of memory
      addr when draw text in hw/display/vga.c.
    - CVE-2018-5683

 -- Marc Deslauriers <email address hidden> Thu, 15 Feb 2018 09:48:27 -0500

Source diff to previous version
CVE-2018-5683 The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by
CVE-2017-18043 Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).
CVE-2017-17381 The Virtio Vring implementation in QEMU allows local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by uns
CVE-2017-16845 hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
CVE-2017-15289 The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds wr
CVE-2017-15119 DoS via large option request
CVE-2017-15038 Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive informatio
CVE-2017-14167 Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary
CVE-2017-11334 The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service

Version: 1:2.5+dfsg-5ubuntu10.20 2018-02-07 19:06:39 UTC

  qemu (1:2.5+dfsg-5ubuntu10.20) xenial-security; urgency=medium

  * SECURITY UPDATE: Add support for Spectre mitigations (LP: #1744882)
    - debian/patches/CVE-2017-5715-1.patch: Lengthen X86CPUDefinition::
      model_id in target-i386/cpu.c.
    - debian/patches/CVE-2017-5715-2.patch: Add support for SPEC_CTRL MSR
      in target-i386/cpu.h, target-i386/kvm.c, target-i386/machine.c.
    - debian/patches/CVE-2017-5715-3pre1.patch: add FEAT_7_0_ECX and
      FEAT_7_0_EDX in target-i386/cpu.c, target-i386/cpu.h.
    - debian/patches/CVE-2017-5715-3.patch: Add spec-ctrl CPUID bit in
      target-i386/cpu.c, target-i386/cpu.h.
    - debian/patches/CVE-2017-5715-4.patch: Add FEAT_8000_0008_EBX CPUID
      feature word in target-i386/cpu.c, target-i386/cpu.h.
    - debian/patches/CVE-2017-5715-5.patch: Add new -IBRS versions of Intel
      CPU models in target-i386/cpu.c.
    - debian/patches/CVE-2017-5715-s390x-1.patch: add linux-header content
      for bpbc in linux-headers/asm-s390/kvm.h, linux-headers/linux/kvm.h.
    - debian/patches/CVE-2017-5715-s390x-2.patch: handle bpb feature in
      target-s390x/cpu.c, target-s390x/cpu.h, target-s390x/kvm.c.
    - CVE-2017-5715

 -- Marc Deslauriers <email address hidden> Thu, 01 Feb 2018 13:27:34 -0500

Source diff to previous version
1744882 Add SPEC_CTRL and IBRS changes
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at

Version: 1:2.5+dfsg-5ubuntu10.16 2017-09-20 19:06:24 UTC

  qemu (1:2.5+dfsg-5ubuntu10.16) xenial-security; urgency=medium

  * SECURITY REGRESSION: regression in in USB xHCI emulation (LP: #1718222)
    - debian/patches/CVE-2017-9375-regression.patch: don't kick in
      xhci_submit and xhci_fire_ctl_transfer in hw/usb/hcd-xhci.c.

 -- Marc Deslauriers <email address hidden> Wed, 20 Sep 2017 07:25:44 -0400

Source diff to previous version

Version: 1:2.5+dfsg-5ubuntu10.15 2017-09-13 12:06:45 UTC
No changelog available yet.
Source diff to previous version

Version: 1:2.5+dfsg-5ubuntu10.14 2017-05-16 16:06:45 UTC

  qemu (1:2.5+dfsg-5ubuntu10.14) xenial-security; urgency=medium

  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/virtio-9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in
      hw/9pfs/virtio-9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379
  * SECURITY REGRESSION: Windows 7 VGA compatibility issue (LP: #1581936)
    - debian/patches/lp1581936.patch: add sr_vbe register set to
      hw/display/vga.c, hw/display/vga_int.h.

 -- Marc Deslauriers <email address hidden> Wed, 10 May 2017 10:09:29 -0400

1581936 Frozen Windows 7 VMs with VGA CVE-2016-3712 fix (2.6.0 and 2.5.1.1)
CVE-2017-7377 The (1) v9fs_create and (2) v9fs_lcreate functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS privileged users to cause a deni
CVE-2017-7718 hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and
CVE-2017-8086 Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a deni
CVE-2017-8309 audio: host memory leakage via capture buffer
CVE-2017-8379 input: host memory lekage via keyboard



About   -   Send Feedback to @ubuntu_updates