-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-5307-1.json
163 lines (163 loc) · 6.96 KB
/
USN-5307-1.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
{
"id": "USN-5307-1",
"summary": "qemu vulnerabilities",
"details": "Gaoning Pan discovered that QEMU incorrectly handled the floppy disk\nemulator. An attacker inside the guest could use this issue to cause QEMU\nto crash, resulting in a denial of service. (CVE-2021-20196)\n\nGaoning Pan discovered that the QEMU vmxnet3 NIC emulator incorrectly\nhandled certain values. An attacker inside the guest could use this issue\nto cause QEMU to crash, resulting in a denial of service. (CVE-2021-20203)\n\nIt was discovered that the QEMU vhost-user GPU device contained several\nsecurity issues. An attacker inside the guest could use these issues to\ncause QEMU to crash, resulting in a denial of service, leak sensitive\ninformation, or possibly execute arbitrary code. This issue only affected\nUbuntu 21.10. (CVE-2021-3544, CVE-2021-3545, CVE-2021-3546)\n\nIt was discovered that QEMU incorrectly handled bulk transfers from SPICE\nclients. A remote attacker could use this issue to cause QEMU to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2021-3682)\n\nIt was discovered that the QEMU UAS device emulation incorrectly handled\ncertain stream numbers. An attacker inside the guest could use this issue\nto cause QEMU to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 21.10.\n(CVE-2021-3713)\n\nIt was discovered that the QEMU virtio-net device incorrectly handled\ncertain buffer addresses. An attacker inside the guest could use this issue\nto cause QEMU to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. (CVE-2021-3748)\n\nIt was discovered that the QEMU SCSI device emulation incorrectly handled\ncertain MODE SELECT commands. An attacker inside the guest could possibly\nuse this issue to cause QEMU to crash, resulting in a denial of service.\n(CVE-2021-3930)\n\nIt was discovered that the QEMU ACPI logic incorrectly handled certain\nvalues. An attacker inside the guest could possibly use this issue to cause\nQEMU to crash, resulting in a denial of service. This issue only affected\nUbuntu 21.10. (CVE-2021-4158)\n\nJietao Xiao, Jinku Li, Wenbo Shen, and Nanzi Yang discovered that the QEMU\nvirtiofsd device incorrectly handled permissions when creating files. An\nattacker inside the guest could use this issue to create files inside the\ndirectory shared by virtiofs with unintended permissions, possibly allowing\nprivilege escalation. This issue only affected Ubuntu 21.10.\n(CVE-2022-0358)\n",
"aliases": [],
"related": [
"CVE-2021-20196",
"CVE-2021-20203",
"CVE-2021-3544",
"CVE-2021-3545",
"CVE-2021-3546",
"CVE-2021-3682",
"CVE-2021-3713",
"CVE-2021-3748",
"CVE-2021-3930",
"CVE-2021-4158",
"CVE-2022-0358"
],
"published": "2022-02-28T13:03:07.827573Z",
"modified": "2022-02-28T13:03:07.827573Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:20.04:LTS",
"name": "qemu"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1:4.2-3ubuntu6.21"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"qemu-system-x86-microvm": "1:4.2-3ubuntu6.21",
"qemu-system-common": "1:4.2-3ubuntu6.21",
"qemu-user-static": "1:4.2-3ubuntu6.21",
"qemu-system-misc": "1:4.2-3ubuntu6.21",
"qemu-block-extra": "1:4.2-3ubuntu6.21",
"qemu-system-s390x": "1:4.2-3ubuntu6.21",
"qemu-user": "1:4.2-3ubuntu6.21",
"qemu-system-sparc": "1:4.2-3ubuntu6.21",
"qemu-guest-agent": "1:4.2-3ubuntu6.21",
"qemu-system": "1:4.2-3ubuntu6.21",
"qemu-utils": "1:4.2-3ubuntu6.21",
"qemu-system-data": "1:4.2-3ubuntu6.21",
"qemu-kvm": "1:4.2-3ubuntu6.21",
"qemu-user-binfmt": "1:4.2-3ubuntu6.21",
"qemu-system-x86": "1:4.2-3ubuntu6.21",
"qemu-system-arm": "1:4.2-3ubuntu6.21",
"qemu-system-gui": "1:4.2-3ubuntu6.21",
"qemu": "1:4.2-3ubuntu6.21",
"qemu-system-ppc": "1:4.2-3ubuntu6.21",
"qemu-system-mips": "1:4.2-3ubuntu6.21",
"qemu-system-x86-xen": "1:4.2-3ubuntu6.21"
}
],
"availability": "No subscription needed"
}
},
{
"package": {
"ecosystem": "Ubuntu:18.04:LTS",
"name": "qemu"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.11+dfsg-1ubuntu7.39"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"qemu-system-common": "1:2.11+dfsg-1ubuntu7.39",
"qemu-user-static": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-s390x": "1:2.11+dfsg-1ubuntu7.39",
"qemu-block-extra": "1:2.11+dfsg-1ubuntu7.39",
"qemu-kvm": "1:2.11+dfsg-1ubuntu7.39",
"qemu-user": "1:2.11+dfsg-1ubuntu7.39",
"qemu-guest-agent": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system": "1:2.11+dfsg-1ubuntu7.39",
"qemu-utils": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-mips": "1:2.11+dfsg-1ubuntu7.39",
"qemu-user-binfmt": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-x86": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-arm": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-sparc": "1:2.11+dfsg-1ubuntu7.39",
"qemu": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-ppc": "1:2.11+dfsg-1ubuntu7.39",
"qemu-system-misc": "1:2.11+dfsg-1ubuntu7.39"
}
],
"availability": "No subscription needed"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-5307-1"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-20196"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-20203"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3544"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3545"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3546"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3682"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3713"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3748"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3930"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-4158"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-0358"
}
]
}