CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2016-5403 Ubuntu Security Notification for Qemu, Qemu-kvm Vulnerabilities (USN-3125-1)

2016年11月16日 1270点热度 0人点赞 0条评论

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

It was discovered that QEMU incorrectly handled the Virtio module.

It was discovered that QEMU incorrectly handled VMWARE VMXNET3 network card emulation support.

It was discovered that QEMU incorrectly handled VMWARE VMXNET3 network card emulation support.

It was discovered that QEMU incorrectly handled VMWARE VMXNET3 network card emulation support.

It was discovered that QEMU incorrectly handled Plan 9 File System (9pfs) support.

It was discovered that QEMU incorrectly handled VMWARE PVSCSI paravirtual SCSI bus emulation support.

It was discovered that QEMU incorrectly handled VMWARE PVSCSI paravirtual SCSI bus emulation support.

It was discovered that QEMU incorrectly handled LSI SAS1068 host bus emulation support.

It was discovered that QEMU incorrectly handled xlnx.xps-ethernetlite emulation support.

It was discovered that QEMU incorrectly handled the VMWare VGA module.

It was discovered that QEMU incorrectly handled the Virtio module.

It was discovered that QEMU incorrectly handled LSI SAS1068 host bus emulation support.

It was discovered that QEMU incorrectly handled USB xHCI controller emulation support.

It was discovered that QEMU incorrectly handled ColdFire Fast Ethernet Controller emulation support.

It was discovered that QEMU incorrectly handled AMD PC-Net II emulation support.

It was discovered that QEMU incorrectly handled the Virtio GPU support.

漏洞危害

A privileged attacker inside the guest could use this issue to cause QEMU to consume resources, resulting in a denial of service. (CVE-2016-5403)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-6833, CVE-2016-6834, CVE-2016-6888)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-6835)

A privileged attacker inside the guest could use this issue to possibly to obtain sensitive host memory. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-6836)

A privileged attacker inside the guest could use this issue to possibly to obtain sensitive host files. (CVE-2016-7116)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-7155)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-7156, CVE-2016-7421)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 16.10. (CVE-2016-7157)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. (CVE-2016-7161)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2016-7170)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 16.10. (CVE-2016-7422)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 16.10. (CVE-2016-7423)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service.(CVE-2016-7466)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2016-7908)

A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2016-7909)

A privileged attacker inside the guest could use this issue to cause QEMU to consume resources, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-7994)

解决方案

Refer to Ubuntu advisory USN-3125-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3125-1: 14.04 (Kylin) on src (qemu-system-sparc)

USN-3125-1: 14.04 (Kylin) on src (qemu-system-mips)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-aarch64)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-ppc)

USN-3125-1: 14.04 (Kylin) on src (qemu-system-misc)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-sparc)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-s390x)

USN-3125-1: 14.04 (Kylin) on src (qemu-system)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-misc)

USN-3125-1: 14.04 (Kylin) on src (qemu-system-aarch64)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-arm)

USN-3125-1: 14.04 (Kylin) on src (qemu-system-arm)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-arm)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-aarch64)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-mips)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-s390x)

USN-3125-1: 14.04 (Kylin) on src (qemu-system-ppc)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-misc)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-x86)

USN-3125-1: 14.04 (Kylin) on src (qemu-system-x86)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-sparc)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-x86)

USN-3125-1: 16.10 (Yakkety) on src (qemu-system-mips)

USN-3125-1: 16.04 (Xenial) on src (qemu-system)

USN-3125-1: 16.04 (Xenial) on src (qemu-system-ppc)

USN-3125-1: 12.04 (Precise) on src (qemu-kvm)

0day

标签: 暂无
最后更新:2016年11月20日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me