{"id":"USN-3560-1","summary":"qemu update","details":"It was discovered that microprocessors utilizing speculative execution\nand branch prediction may allow unauthorized memory reads via sidechannel\nattacks. This flaw is known as Spectre. An attacker in the guest could use\nthis to expose sensitive guest information, including kernel memory.\n\nThis update allows QEMU to expose new CPU features added by microcode\nupdates to guests on amd64, i386, and s390x. On amd64 and i386, new CPU\nmodels that match the updated microcode features were added with an -IBRS\nsuffix. Certain environments will require guests to be switched manually to\nthe new CPU models after microcode updates have been applied to the host.\n","modified":"2026-02-10T04:41:16Z","published":"2018-02-07T16:29:55Z","related":["UBUNTU-CVE-2017-5715"],"upstream":["CVE-2017-5715","UBUNTU-CVE-2017-5715"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3560-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5715"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/qemu@2.0.0+dfsg-2ubuntu1.38?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0+dfsg-2ubuntu1.38"}]}],"versions":["1.5.0+dfsg-3ubuntu5","1.5.0+dfsg-3ubuntu6","1.6.0+dfsg-2ubuntu1","1.6.0+dfsg-2ubuntu2","1.6.0+dfsg-2ubuntu3","1.6.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu1","1.7.0+dfsg-2ubuntu2","1.7.0+dfsg-2ubuntu3","1.7.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu5","1.7.0+dfsg-2ubuntu7","1.7.0+dfsg-2ubuntu8","1.7.0+dfsg-2ubuntu9","1.7.0+dfsg-3ubuntu1~ppa1","1.7.0+dfsg-3ubuntu1","1.7.0+dfsg-3ubuntu2","1.7.0+dfsg-3ubuntu3","1.7.0+dfsg-3ubuntu4","1.7.0+dfsg-3ubuntu5","1.7.0+dfsg-3ubuntu6","1.7.0+dfsg-3ubuntu7","2.0.0~rc1+dfsg-0ubuntu1","2.0.0~rc1+dfsg-0ubuntu2","2.0.0~rc1+dfsg-0ubuntu3","2.0.0~rc1+dfsg-0ubuntu3.1","2.0.0+dfsg-2ubuntu1","2.0.0+dfsg-2ubuntu1.1","2.0.0+dfsg-2ubuntu1.2","2.0.0+dfsg-2ubuntu1.3","2.0.0+dfsg-2ubuntu1.5","2.0.0+dfsg-2ubuntu1.6","2.0.0+dfsg-2ubuntu1.7","2.0.0+dfsg-2ubuntu1.8","2.0.0+dfsg-2ubuntu1.9","2.0.0+dfsg-2ubuntu1.10","2.0.0+dfsg-2ubuntu1.11","2.0.0+dfsg-2ubuntu1.13","2.0.0+dfsg-2ubuntu1.14","2.0.0+dfsg-2ubuntu1.15","2.0.0+dfsg-2ubuntu1.16","2.0.0+dfsg-2ubuntu1.17","2.0.0+dfsg-2ubuntu1.18","2.0.0+dfsg-2ubuntu1.19","2.0.0+dfsg-2ubuntu1.20","2.0.0+dfsg-2ubuntu1.21","2.0.0+dfsg-2ubuntu1.22","2.0.0+dfsg-2ubuntu1.24","2.0.0+dfsg-2ubuntu1.25","2.0.0+dfsg-2ubuntu1.26","2.0.0+dfsg-2ubuntu1.27","2.0.0+dfsg-2ubuntu1.28","2.0.0+dfsg-2ubuntu1.29","2.0.0+dfsg-2ubuntu1.30","2.0.0+dfsg-2ubuntu1.31","2.0.0+dfsg-2ubuntu1.32","2.0.0+dfsg-2ubuntu1.33","2.0.0+dfsg-2ubuntu1.34","2.0.0+dfsg-2ubuntu1.35","2.0.0+dfsg-2ubuntu1.36"],"ecosystem_specific":{"binaries":[{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-common"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-guest-agent"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-keymaps"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-kvm"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-aarch64"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-arm"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-common"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-mips"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-misc"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-ppc"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-sparc"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-system-x86"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-user"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-user-static"},{"binary_version":"2.0.0+dfsg-2ubuntu1.38","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3560-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2017-5715","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]}]}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.5+dfsg-5ubuntu10.20?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.5+dfsg-5ubuntu10.20"}]}],"versions":["1:2.3+dfsg-5ubuntu9","1:2.3+dfsg-5ubuntu10","1:2.4+dfsg-4ubuntu1","1:2.4+dfsg-4ubuntu2","1:2.4+dfsg-4ubuntu3","1:2.4+dfsg-5ubuntu3","1:2.5+dfsg-1ubuntu2","1:2.5+dfsg-1ubuntu3","1:2.5+dfsg-1ubuntu4","1:2.5+dfsg-1ubuntu5","1:2.5+dfsg-5ubuntu1","1:2.5+dfsg-5ubuntu2","1:2.5+dfsg-5ubuntu4","1:2.5+dfsg-5ubuntu6","1:2.5+dfsg-5ubuntu7","1:2.5+dfsg-5ubuntu10","1:2.5+dfsg-5ubuntu10.1","1:2.5+dfsg-5ubuntu10.2","1:2.5+dfsg-5ubuntu10.3","1:2.5+dfsg-5ubuntu10.4","1:2.5+dfsg-5ubuntu10.5","1:2.5+dfsg-5ubuntu10.6","1:2.5+dfsg-5ubuntu10.7","1:2.5+dfsg-5ubuntu10.8","1:2.5+dfsg-5ubuntu10.9","1:2.5+dfsg-5ubuntu10.10","1:2.5+dfsg-5ubuntu10.11","1:2.5+dfsg-5ubuntu10.13","1:2.5+dfsg-5ubuntu10.14","1:2.5+dfsg-5ubuntu10.15","1:2.5+dfsg-5ubuntu10.16"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-block-extra"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-guest-agent"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-kvm"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-aarch64"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-arm"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-common"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-mips"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-misc"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-ppc"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-s390x"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-sparc"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-system-x86"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-user"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-user-binfmt"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-user-static"},{"binary_version":"1:2.5+dfsg-5ubuntu10.20","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3560-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2017-5715","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]}]}}}],"schema_version":"1.7.3"}