All Vulnerability Reports

USN-4191-1: QEMU vulnerabilities


Severity

Low

Vendor

Canonical Ubuntu

Versions Affected
  • Canonical Ubuntu 16.04
Description

It was discovered that the LSI SCSI adapter emulator implementation in QEMU did not properly validate executed scripts. A local attacker could use this to cause a denial of service. (CVE-2019-12068)

Sergej Schumilo, Cornelius Aschermann and Simon Wörner discovered that the qxl paravirtual graphics driver implementation in QEMU contained a null pointer dereference. A local attacker in a guest could use this to cause a denial of service. (CVE-2019-12155)

Riccardo Schirone discovered that the QEMU bridge helper did not properly validate network interface names. A local attacker could possibly use this to bypass ACL restrictions. (CVE-2019-13164)

It was discovered that a heap-based buffer overflow existed in the SLiRP networking implementation of QEMU. A local attacker in a guest could use this to cause a denial of service or possibly execute arbitrary code in the host. (CVE-2019-14378)

It was discovered that a use-after-free vulnerability existed in the SLiRP networking implementation of QEMU. A local attacker in a guest could use this to cause a denial of service. (CVE-2019-15890)

CVEs contained in this USN include: CVE-2019-12068, CVE-2019-12155, CVE-2019-13164, CVE-2019-14378, CVE-2019-15890

Affected Pivotal Products and Versions

Severity is low unless otherwise noted.

  • Pivotal Operations Manager
    • 2.7.x versions prior to 2.7.4
    • 2.6.x versions prior to 2.6.15
    • 2.5.x versions prior to 2.5.23
    • 2.4.x versions prior to 2.4.26
Mitigation

Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:

  • Pivotal Operations Manager
    • 2.7.4
    • 2.6.15
    • 2.5.23
    • 2.4.26
References
문의