Debian DSA-4213-1 : qemu - security update (Spectre)

critical Nessus Plugin ID 110208

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in qemu, a fast processor emulator.

- CVE-2017-15038 Tuomas Tynkkynen discovered an information leak in 9pfs.

- CVE-2017-15119 Eric Blake discovered that the NBD server insufficiently restricts large option requests, resulting in denial of service.

- CVE-2017-15124 Daniel Berrange discovered that the integrated VNC server insufficiently restricted memory allocation, which could result in denial of service.

- CVE-2017-15268 A memory leak in websockets support may result in denial of service.

- CVE-2017-15289 Guoxiang Niu discovered an OOB write in the emulated Cirrus graphics adaptor which could result in denial of service.

- CVE-2017-16845 Cyrille Chatras discovered an information leak in PS/2 mouse and keyboard emulation which could be exploited during instance migration.

- CVE-2017-17381 Dengzhan Heyuandong Bijunhua and Liweichao discovered that an implementation error in the virtio vring implementation could result in denial of service.

- CVE-2017-18043 Eric Blake discovered an integer overflow in an internally used macro which could result in denial of service.

- CVE-2018-5683 Jiang Xin and Lin ZheCheng discovered an OOB memory access in the emulated VGA adaptor which could result in denial of service.

- CVE-2018-7550 Cyrille Chatras discovered that an OOB memory write when using multiboot could result in the execution of arbitrary code.

This update also backports a number of mitigations against the Spectre v2 vulnerability affecting modern CPUs (CVE-2017-5715 ). For additional information please refer to https://www.qemu.org/2018/01/04/spectre/

Solution

Upgrade the qemu packages.

For the stable distribution (stretch), these problems have been fixed in version 1:2.8+dfsg-6+deb9u4.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877890

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880832

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880836

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883399

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532

https://security-tracker.debian.org/tracker/CVE-2017-15038

https://security-tracker.debian.org/tracker/CVE-2017-15119

https://security-tracker.debian.org/tracker/CVE-2017-15124

https://security-tracker.debian.org/tracker/CVE-2017-15268

https://security-tracker.debian.org/tracker/CVE-2017-15289

https://security-tracker.debian.org/tracker/CVE-2017-16845

https://security-tracker.debian.org/tracker/CVE-2017-17381

https://security-tracker.debian.org/tracker/CVE-2017-18043

https://security-tracker.debian.org/tracker/CVE-2018-5683

https://security-tracker.debian.org/tracker/CVE-2018-7550

https://security-tracker.debian.org/tracker/CVE-2017-5715

https://www.qemu.org/2018/01/04/spectre/

https://security-tracker.debian.org/tracker/source-package/qemu

https://packages.debian.org/source/stretch/qemu

https://www.debian.org/security/2018/dsa-4213

Plugin Details

Severity: Critical

ID: 110208

File Name: debian_DSA-4213.nasl

Version: 1.10

Type: local

Agent: unix

Published: 5/30/2018

Updated: 9/11/2020

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:qemu, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/29/2018

Vulnerability Publication Date: 10/10/2017

Reference Information

CVE: CVE-2017-15038, CVE-2017-15119, CVE-2017-15124, CVE-2017-15268, CVE-2017-15289, CVE-2017-16845, CVE-2017-17381, CVE-2017-18043, CVE-2017-5715, CVE-2018-5683, CVE-2018-7550

DSA: 4213