{"id":15673,"date":"2017-04-21T07:34:19","date_gmt":"2017-04-20T22:34:19","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3261-1-qemu-vulnerabilities\/"},"modified":"2017-04-21T07:34:19","modified_gmt":"2017-04-20T22:34:19","slug":"usn-3261-1-qemu-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3261-1-qemu-vulnerabilities\/","title":{"rendered":"USN-3261-1: QEMU vulnerabilities"},"content":{"rendered":"<p>USN-3261-1: QEMU vulnerabilities<\/p>\n<h2>Ubuntu Security Notice USN-3261-1<\/h2>\n<p><em>20th April, 2017<\/em><\/p>\n<h3>qemu vulnerabilities<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 16.10<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>Several security issues were fixed in QEMU.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>qemu<br \/>\n    &#8211; Machine emulator and virtualizer<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>Zhenhao Hong discovered that QEMU incorrectly handled the Virtio GPU<br \/>device. An attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. This issue only affected Ubuntu<br \/>16.04 LTS and Ubuntu 16.10. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-10028\">CVE-2016-10028<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-10029\">CVE-2016-10029<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the 6300esb watchdog. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-10155\">CVE-2016-10155<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the i.MX Fast Ethernet<br \/>Controller. A privileged attacker inside the guest could use this issue to<br \/>cause QEMU to crash, resulting in a denial of service. This issue only<br \/>affected Ubuntu 16.04 LTS and Ubuntu 16.10. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-7907\">CVE-2016-7907<\/a>)<\/p>\n<p>It was discovered that QEMU incorrectly handled the JAZZ RC4030 device. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-8667\">CVE-2016-8667<\/a>)<\/p>\n<p>It was discovered that QEMU incorrectly handled the 16550A UART device. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-8669\">CVE-2016-8669<\/a>)<\/p>\n<p>It was discovered that QEMU incorrectly handled the shared rings when used<br \/>with Xen. A privileged attacker inside the guest could use this issue to<br \/>cause QEMU to crash, resulting in a denial of service, or possibly execute<br \/>arbitrary code on the host. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9381\">CVE-2016-9381<\/a>)<\/p>\n<p>Jann Horn discovered that QEMU incorrectly handled VirtFS directory<br \/>sharing. A privileged attacker inside the guest could use this issue to<br \/>access files on the host file system outside of the shared directory and<br \/>possibly escalate their privileges. In the default installation, when QEMU<br \/>is used with libvirt, attackers would be isolated by the libvirt AppArmor<br \/>profile. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9602\">CVE-2016-9602<\/a>)<\/p>\n<p>Gerd Hoffmann discovered that QEMU incorrectly handled the Cirrus VGA<br \/>device when being used with a VNC connection. A privileged attacker inside<br \/>the guest could use this issue to cause QEMU to crash, resulting in a<br \/>denial of service, or possibly execute arbitrary code on the host. In the<br \/>default installation, when QEMU is used with libvirt, attackers would be<br \/>isolated by the libvirt AppArmor profile. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9603\">CVE-2016-9603<\/a>)<\/p>\n<p>It was discovered that QEMU incorrectly handled the ColdFire Fast Ethernet<br \/>Controller. A privileged attacker inside the guest could use this issue to<br \/>cause QEMU to crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9776\">CVE-2016-9776<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the Virtio GPU device. An<br \/>attacker inside the guest could use this issue to cause QEMU to leak<br \/>contents of host memory. This issue only affected Ubuntu 16.04 LTS and<br \/>Ubuntu 16.10. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9845\">CVE-2016-9845<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9908\">CVE-2016-9908<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the Virtio GPU device. An<br \/>attacker inside the guest could use this issue to cause QEMU to crash,<br \/>resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS<br \/>and Ubuntu 16.10. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9846\">CVE-2016-9846<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9912\">CVE-2016-9912<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5552\">CVE-2017-5552<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5578\">CVE-2017-5578<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5857\">CVE-2017-5857<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the USB redirector. An<br \/>attacker inside the guest could use this issue to cause QEMU to crash,<br \/>resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS<br \/>and Ubuntu 16.10. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9907\">CVE-2016-9907<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled USB EHCI emulation. An<br \/>attacker inside the guest could use this issue to cause QEMU to crash,<br \/>resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9911\">CVE-2016-9911<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled VirtFS directory sharing.<br \/>A privileged attacker inside the guest could use this issue to cause QEMU<br \/>to crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9913\">CVE-2016-9913<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9914\">CVE-2016-9914<\/a>,<br \/><a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9915\">CVE-2016-9915<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9916\">CVE-2016-9916<\/a>)<\/p>\n<p>Qinghao Tang, Li Qiang, and Jiangxin discovered that QEMU incorrectly<br \/>handled the Cirrus VGA device. A privileged attacker inside the guest could<br \/>use this issue to cause QEMU to crash, resulting in a denial of service.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9921\">CVE-2016-9921<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9922\">CVE-2016-9922<\/a>)<\/p>\n<p>Wjjzhang and Li Qiang discovered that QEMU incorrectly handled the Cirrus<br \/>VGA device. A privileged attacker inside the guest could use this issue to<br \/>cause QEMU to crash, resulting in a denial of service, or possibly execute<br \/>arbitrary code on the host. In the default installation, when QEMU is used<br \/>with libvirt, attackers would be isolated by the libvirt AppArmor profile.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-2615\">CVE-2017-2615<\/a>)<\/p>\n<p>It was discovered that QEMU incorrectly handled the Cirrus VGA device. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service, or possibly execute arbitrary code<br \/>on the host. In the default installation, when QEMU is used with libvirt,<br \/>attackers would be isolated by the libvirt AppArmor profile.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-2620\">CVE-2017-2620<\/a>)<\/p>\n<p>It was discovered that QEMU incorrectly handled VNC connections. An<br \/>attacker inside the guest could use this issue to cause QEMU to crash,<br \/>resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-2633\">CVE-2017-2633<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the ac97 audio device. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5525\">CVE-2017-5525<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the es1370 audio device.<br \/>A privileged attacker inside the guest could use this issue to cause QEMU<br \/>to crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5526\">CVE-2017-5526<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the 16550A UART device. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5579\">CVE-2017-5579<\/a>)<\/p>\n<p>Jiang Xin discovered that QEMU incorrectly handled SDHCI device emulation.<br \/>A privileged attacker inside the guest could use this issue to cause QEMU<br \/>to crash, resulting in a denial of service, or possibly execute arbitrary<br \/>code on the host. In the default installation, when QEMU is used with<br \/>libvirt, attackers would be isolated by the libvirt AppArmor profile.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5667\">CVE-2017-5667<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the MegaRAID SAS device.<br \/>A privileged attacker inside the guest could use this issue to cause QEMU<br \/>to crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5856\">CVE-2017-5856<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled the CCID Card device. A<br \/>privileged attacker inside the guest could use this issue to cause QEMU to<br \/>crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5898\">CVE-2017-5898<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled USB xHCI controller<br \/>emulation. A privileged attacker inside the guest could use this issue to<br \/>cause QEMU to crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5973\">CVE-2017-5973<\/a>)<\/p>\n<p>Jiang Xin and Wjjzhang discovered that QEMU incorrectly handled SDHCI<br \/>device emulation. A privileged attacker inside the guest could use this<br \/>issue to cause QEMU to crash, resulting in a denial of service.<br \/>(<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5987\">CVE-2017-5987<\/a>)<\/p>\n<p>Li Qiang discovered that QEMU incorrectly handled USB OHCI controller<br \/>emulation. A privileged attacker inside the guest could use this issue to<br \/>cause QEMU to hang, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-6505\">CVE-2017-6505<\/a>)<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 16.10:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-s390x<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-misc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-aarch64<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-x86<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-sparc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-arm<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-ppc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-mips<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.6.1+dfsg-0ubuntu5.4\">1:2.6.1+dfsg-0ubuntu5.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-s390x<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-misc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-aarch64<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-x86<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-sparc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-arm<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-ppc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-mips<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/1:2.5+dfsg-5ubuntu10.11\">1:2.5+dfsg-5ubuntu10.11<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-misc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-aarch64<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-x86<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-sparc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-arm<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-ppc<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\">qemu-system-mips<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/qemu\/2.0.0+dfsg-2ubuntu1.33\">2.0.0+dfsg-2ubuntu1.33<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to restart all QEMU virtual<br \/>machines to make all the necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-10028\">CVE-2016-10028<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-10029\">CVE-2016-10029<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-10155\">CVE-2016-10155<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-7907\">CVE-2016-7907<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-8667\">CVE-2016-8667<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-8669\">CVE-2016-8669<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9381\">CVE-2016-9381<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9602\">CVE-2016-9602<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9603\">CVE-2016-9603<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9776\">CVE-2016-9776<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9845\">CVE-2016-9845<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9846\">CVE-2016-9846<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9907\">CVE-2016-9907<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9908\">CVE-2016-9908<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9911\">CVE-2016-9911<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9912\">CVE-2016-9912<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9913\">CVE-2016-9913<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9914\">CVE-2016-9914<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9915\">CVE-2016-9915<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9916\">CVE-2016-9916<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9921\">CVE-2016-9921<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2016-9922\">CVE-2016-9922<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-2615\">CVE-2017-2615<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-2620\">CVE-2017-2620<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-2633\">CVE-2017-2633<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5525\">CVE-2017-5525<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5526\">CVE-2017-5526<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5552\">CVE-2017-5552<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5578\">CVE-2017-5578<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5579\">CVE-2017-5579<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5667\">CVE-2017-5667<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5856\">CVE-2017-5856<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5857\">CVE-2017-5857<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5898\">CVE-2017-5898<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5973\">CVE-2017-5973<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5987\">CVE-2017-5987<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-6505\">CVE-2017-6505<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3261-1\/\" target=\"_blank\">USN-3261-1: QEMU vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3261-1: QEMU vulnerabilities Ubuntu Security Notice USN-3261-1 20th April, 2017 qemu vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Several security issues were fixed in QEMU. Software description qemu &#8211; Machine emulator and virtualizer Details Zhenhao Hong discovered that QEMU incorrectly handled the Virtio GPUdevice. An attacker inside the guest could use this issue to cause QEMU tocrash, resulting in a denial of service. This issue only affected Ubuntu16.04 LTS and Ubuntu 16.10. (CVE-2016-10028, CVE-2016-10029) Li Qiang discovered that QEMU incorrectly handled the 6300esb watchdog. Aprivileged attacker inside the guest could use this issue to cause QEMU tocrash, resulting in a denial of service. (CVE-2016-10155) Li Qiang discovered that QEMU incorrectly handled the i.MX Fast EthernetController. A privileged attacker inside the guest could use this issue tocause <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3261-1-qemu-vulnerabilities\/\" title=\"USN-3261-1: QEMU vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-15673","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=15673"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15673\/revisions"}],"predecessor-version":[{"id":15674,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15673\/revisions\/15674"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=15673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=15673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=15673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}