{"id":"USN-3414-2","summary":"qemu regression","details":"USN-3414-1 fixed vulnerabilities in QEMU. The patch backport for\nCVE-2017-9375 was incomplete and caused a regression in the USB xHCI\ncontroller emulation support. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n Leo Gaspard discovered that QEMU incorrectly handled VirtFS access control.\n A guest attacker could use this issue to elevate privileges inside the\n guest. (CVE-2017-7493)\n \n Li Qiang discovered that QEMU incorrectly handled VMWare PVSCSI emulation.\n A privileged attacker inside the guest could use this issue to cause QEMU\n to consume resources or crash, resulting in a denial of service.\n (CVE-2017-8112)\n \n It was discovered that QEMU incorrectly handled MegaRAID SAS 8708EM2 Host\n Bus Adapter emulation support. A privileged attacker inside the guest could\n use this issue to cause QEMU to crash, resulting in a denial of service, or\n possibly to obtain sensitive host memory. This issue only affected Ubuntu\n 16.04 LTS and Ubuntu 17.04. (CVE-2017-8380)\n \n Li Qiang discovered that QEMU incorrectly handled the Virtio GPU device. An\n attacker inside the guest could use this issue to cause QEMU to consume\n resources and crash, resulting in a denial of service. This issue only\n affected Ubuntu 17.04. (CVE-2017-9060)\n \n Li Qiang discovered that QEMU incorrectly handled the e1000e device. A\n privileged attacker inside the guest could use this issue to cause QEMU to\n hang, resulting in a denial of service. This issue only affected Ubuntu\n 17.04. (CVE-2017-9310)\n \n Li Qiang discovered that QEMU incorrectly handled USB OHCI emulation\n support. An attacker inside the guest could use this issue to cause QEMU to\n crash, resulting in a denial of service. (CVE-2017-9330)\n \n Li Qiang discovered that QEMU incorrectly handled IDE AHCI emulation\n support. A privileged attacker inside the guest could use this issue to\n cause QEMU to consume resources and crash, resulting in a denial of\n service. (CVE-2017-9373)\n \n Li Qiang discovered that QEMU incorrectly handled USB EHCI emulation\n support. A privileged attacker inside the guest could use this issue to\n cause QEMU to consume resources and crash, resulting in a denial of\n service. (CVE-2017-9374)\n \n Li Qiang discovered that QEMU incorrectly handled USB xHCI emulation\n support. A privileged attacker inside the guest could use this issue to\n cause QEMU to hang, resulting in a denial of service. (CVE-2017-9375)\n \n Zhangyanyu discovered that QEMU incorrectly handled MegaRAID SAS 8708EM2\n Host Bus Adapter emulation support. A privileged attacker inside the guest\n could use this issue to cause QEMU to crash, resulting in a denial of\n service. (CVE-2017-9503)\n \n It was discovered that the QEMU qemu-nbd server incorrectly handled\n initialization. A remote attacker could use this issue to cause the server\n to crash, resulting in a denial of service. (CVE-2017-9524)\n \n It was discovered that the QEMU qemu-nbd server incorrectly handled\n signals. A remote attacker could use this issue to cause the server to\n crash, resulting in a denial of service. (CVE-2017-10664)\n \n Li Qiang discovered that the QEMU USB redirector incorrectly handled\n logging debug messages. An attacker inside the guest could use this issue\n to cause QEMU to crash, resulting in a denial of service. (CVE-2017-10806)\n \n Anthony Perard discovered that QEMU incorrectly handled Xen block-interface\n responses. An attacker inside the guest could use this issue to cause QEMU\n to leak contents of host memory. (CVE-2017-10911)\n \n Reno Robert discovered that QEMU incorrectly handled certain DHCP options\n strings. An attacker inside the guest could use this issue to cause QEMU\n to crash, resulting in a denial of service. (CVE-2017-11434)\n \n Ryan Salsamendi discovered that QEMU incorrectly handled empty CDROM device\n drives. A privileged attacker inside the guest could use this issue to\n cause QEMU to crash, resulting in a denial of service. This issue only\n affected Ubuntu 16.04 LTS and Ubuntu 17.04. (CVE-2017-12809)\n","modified":"2026-02-10T04:41:12Z","published":"2017-09-20T18:00:39Z","references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3414-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1718222"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/qemu@2.0.0+dfsg-2ubuntu1.36?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0+dfsg-2ubuntu1.36"}]}],"versions":["1.5.0+dfsg-3ubuntu5","1.5.0+dfsg-3ubuntu6","1.6.0+dfsg-2ubuntu1","1.6.0+dfsg-2ubuntu2","1.6.0+dfsg-2ubuntu3","1.6.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu1","1.7.0+dfsg-2ubuntu2","1.7.0+dfsg-2ubuntu3","1.7.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu5","1.7.0+dfsg-2ubuntu7","1.7.0+dfsg-2ubuntu8","1.7.0+dfsg-2ubuntu9","1.7.0+dfsg-3ubuntu1~ppa1","1.7.0+dfsg-3ubuntu1","1.7.0+dfsg-3ubuntu2","1.7.0+dfsg-3ubuntu3","1.7.0+dfsg-3ubuntu4","1.7.0+dfsg-3ubuntu5","1.7.0+dfsg-3ubuntu6","1.7.0+dfsg-3ubuntu7","2.0.0~rc1+dfsg-0ubuntu1","2.0.0~rc1+dfsg-0ubuntu2","2.0.0~rc1+dfsg-0ubuntu3","2.0.0~rc1+dfsg-0ubuntu3.1","2.0.0+dfsg-2ubuntu1","2.0.0+dfsg-2ubuntu1.1","2.0.0+dfsg-2ubuntu1.2","2.0.0+dfsg-2ubuntu1.3","2.0.0+dfsg-2ubuntu1.5","2.0.0+dfsg-2ubuntu1.6","2.0.0+dfsg-2ubuntu1.7","2.0.0+dfsg-2ubuntu1.8","2.0.0+dfsg-2ubuntu1.9","2.0.0+dfsg-2ubuntu1.10","2.0.0+dfsg-2ubuntu1.11","2.0.0+dfsg-2ubuntu1.13","2.0.0+dfsg-2ubuntu1.14","2.0.0+dfsg-2ubuntu1.15","2.0.0+dfsg-2ubuntu1.16","2.0.0+dfsg-2ubuntu1.17","2.0.0+dfsg-2ubuntu1.18","2.0.0+dfsg-2ubuntu1.19","2.0.0+dfsg-2ubuntu1.20","2.0.0+dfsg-2ubuntu1.21","2.0.0+dfsg-2ubuntu1.22","2.0.0+dfsg-2ubuntu1.24","2.0.0+dfsg-2ubuntu1.25","2.0.0+dfsg-2ubuntu1.26","2.0.0+dfsg-2ubuntu1.27","2.0.0+dfsg-2ubuntu1.28","2.0.0+dfsg-2ubuntu1.29","2.0.0+dfsg-2ubuntu1.30","2.0.0+dfsg-2ubuntu1.31","2.0.0+dfsg-2ubuntu1.32","2.0.0+dfsg-2ubuntu1.33","2.0.0+dfsg-2ubuntu1.34","2.0.0+dfsg-2ubuntu1.35"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"qemu","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-common","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-guest-agent","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-keymaps","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-kvm","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-aarch64","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-arm","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-common","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-mips","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-misc","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-ppc","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-sparc","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-system-x86","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-user","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-user-static","binary_version":"2.0.0+dfsg-2ubuntu1.36"},{"binary_name":"qemu-utils","binary_version":"2.0.0+dfsg-2ubuntu1.36"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3414-2.json"}},{"package":{"name":"qemu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.5+dfsg-5ubuntu10.16?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.5+dfsg-5ubuntu10.16"}]}],"versions":["1:2.3+dfsg-5ubuntu9","1:2.3+dfsg-5ubuntu10","1:2.4+dfsg-4ubuntu1","1:2.4+dfsg-4ubuntu2","1:2.4+dfsg-4ubuntu3","1:2.4+dfsg-5ubuntu3","1:2.5+dfsg-1ubuntu2","1:2.5+dfsg-1ubuntu3","1:2.5+dfsg-1ubuntu4","1:2.5+dfsg-1ubuntu5","1:2.5+dfsg-5ubuntu1","1:2.5+dfsg-5ubuntu2","1:2.5+dfsg-5ubuntu4","1:2.5+dfsg-5ubuntu6","1:2.5+dfsg-5ubuntu7","1:2.5+dfsg-5ubuntu10","1:2.5+dfsg-5ubuntu10.1","1:2.5+dfsg-5ubuntu10.2","1:2.5+dfsg-5ubuntu10.3","1:2.5+dfsg-5ubuntu10.4","1:2.5+dfsg-5ubuntu10.5","1:2.5+dfsg-5ubuntu10.6","1:2.5+dfsg-5ubuntu10.7","1:2.5+dfsg-5ubuntu10.8","1:2.5+dfsg-5ubuntu10.9","1:2.5+dfsg-5ubuntu10.10","1:2.5+dfsg-5ubuntu10.11","1:2.5+dfsg-5ubuntu10.13","1:2.5+dfsg-5ubuntu10.14","1:2.5+dfsg-5ubuntu10.15"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"qemu","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-block-extra","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-guest-agent","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-kvm","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-aarch64","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-arm","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-common","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-mips","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-misc","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-ppc","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-s390x","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-sparc","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-system-x86","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-user","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-user-binfmt","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-user-static","binary_version":"1:2.5+dfsg-5ubuntu10.16"},{"binary_name":"qemu-utils","binary_version":"1:2.5+dfsg-5ubuntu10.16"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3414-2.json"}}],"schema_version":"1.7.3"}