The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of QEMU: memory corruption via USB Emulator

Synthesis of the vulnerability 

An attacker, inside a guest system, can trigger a memory corruption via USB Emulator of QEMU, in order to trigger a denial of service, and possibly to run code on the host system.
Impacted products: XenServer, Debian, BIG-IP Hardware, TMOS, Fedora, openSUSE Leap, QEMU, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Xen.
Severity of this bulletin: 2/4.
Creation date: 24/08/2020.
Références of this threat: CERTFR-2020-AVI-525, CERTFR-2020-AVI-526, CTX280451, CVE-2020-14364, DLA-2373-1, DSA-4760-1, FEDORA-2020-3689b67b53, FEDORA-2020-eeb29955ed, K09081535, openSUSE-SU-2020:1664-1, RHSA-2020:4047-01, RHSA-2020:4048-01, RHSA-2020:4049-01, RHSA-2020:4050-01, RHSA-2020:4051-01, RHSA-2020:4052-01, RHSA-2020:4053-01, RHSA-2020:4054-01, RHSA-2020:4055-01, RHSA-2020:4056-01, RHSA-2020:4058-01, RHSA-2020:4059-01, RHSA-2020:4078-01, RHSA-2020:4079-01, RHSA-2020:4162-01, RHSA-2020:4290-01, RHSA-2020:4291-01, SUSE-SU-2020:14521-1, SUSE-SU-2020:2743-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, SUSE-SU-2020:2877-1, USN-4511-1, VIGILANCE-VUL-33141, XSA-335.

Description of the vulnerability 

An attacker, inside a guest system, can trigger a memory corruption via USB Emulator of QEMU, in order to trigger a denial of service, and possibly to run code on the host system.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat note impacts software or systems such as XenServer, Debian, BIG-IP Hardware, TMOS, Fedora, openSUSE Leap, QEMU, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Xen.

Our Vigil@nce team determined that the severity of this cybersecurity note is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this vulnerability note.

Solutions for this threat 

QEMU: version 5.0.1.
The version 5.0.1 is fixed:
  https://www.qemu.org/download/#source

QEMU: patch for USB Emulator.
A patch is indicated in information sources.

Xen: patch for QEMU USB Emulator.
A patch is available:
  http://xenbits.xen.org/xsa/xsa335-qemu.patch
  http://xenbits.xen.org/xsa/xsa335-trad.patch

Citrix Hypervisor: patch for QEMU USB Emulator.
A patch is available:
  Citrix Hypervisor 8.2 LTSR: CTX280214 - https://support.citrix.com/article/CTX280214
  Citrix Hypervisor 8.1: CTX280213 - https://support.citrix.com/article/CTX280213
  Citrix Hypervisor 8.0: CTX280212 - https://support.citrix.com/article/CTX280212
  Citrix XenServer 7.1 LTSR CU2: CTX280211 - https://support.citrix.com/article/CTX280211
  Citrix XenServer 7.0: CTX280210 - https://support.citrix.com/article/CTX280210

Debian 10: new qemu packages.
New packages are available:
  Debian 10: qemu 1:3.1+dfsg-8+deb10u8

Debian 9: new qemu packages.
New packages are available:
  Debian 9: qemu 1:2.8+dfsg-6+deb9u11

F5 BIG-IP: solution for QEMU CVE-2020-14364.
The solution is indicated in information sources.

Fedora 31: new xen packages.
New packages are available:
  Fedora 31: xen 4.12.3-4.fc31

Fedora 32: new xen packages.
New packages are available:
  Fedora 32: xen 4.13.1-5.fc32

openSUSE Leap 15.2: new qemu packages.
New packages are available:
  openSUSE Leap 15.2: qemu 4.2.1-lp152.9.6.1

RHEL 6.10: new qemu-kvm packages.
New packages are available:
  RHEL 6.10: qemu-kvm 0.12.1.2-2.506.el6_10.8

RHEL 7.6: new qemu-kvm-ma packages.
New packages are available:
  RHEL 7.6: qemu-kvm-ma 2.12.0-18.el7_6.7

RHEL 7.7: new qemu-kvm-ma packages.
New packages are available:
  RHEL 7.7: qemu-kvm-ma 2.12.0-33.el7_7.4

RHEL 7.9: new qemu-kvm-ma packages.
New packages are available:
  RHEL 7.9: qemu-kvm-ma 2.12.0-48.el7_9.1

RHEL 7.9: new qemu-kvm packages.
New packages are available:
  RHEL 7.9: qemu-kvm 1.5.3-175.el7_9.1

RHEL 8.0: new virt-rhel module.
The following module is updated:
  RHEL 8.0 Module: virt:rhel

RHEL 8.1: new virt-8.1 module.
The following module is updated:
  RHEL 8.1 Module: virt:8.1

RHEL 8.1: new virt-rhel module.
The following module is updated:
  RHEL 8.1 Module: virt:rhel

RHEL 8.2: new virt-8.2 module.
The following module is updated:
  RHEL 8.2 Module: virt:8.2

RHEL 8: new virt-rhel module.
The following module is updated:
  RHEL 8 Module: virt:rhel

RHEL: new qemu-kvm packages.
New packages are available:
  RHEL 6.5: qemu-kvm 0.12.1.2-2.415.el6_5.21
  RHEL 6.6: qemu-kvm 0.12.1.2-2.448.el6_6.9
  RHEL 7.2: qemu-kvm 1.5.3-105.el7_2.20
  RHEL 7.3: qemu-kvm 1.5.3-126.el7_3.18
  RHEL 7.4: qemu-kvm 1.5.3-141.el7_4.11
  RHEL 7.6: qemu-kvm 1.5.3-160.el7_6.8
  RHEL 7.7: qemu-kvm 1.5.3-167.el7_7.7

SUSE LE 11 SP4: new xen packages.
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_44-61.55.1

SUSE LE 12 SP2: new xen packages.
New packages are available:
  SUSE LE 12 SP2: xen 4.7.6_10-43.67.1

SUSE LE 12 SP5: new qemu packages.
New packages are available:
  SUSE LE 12 SP5: qemu 3.1.1.1-45.1

SUSE LE 15 SP2: new qemu packages.
New packages are available:
  SUSE LE 15 SP2: qemu 4.2.1-11.10.1

SUSE LE: new xen packages.
New packages are available:
  SUSE LE 12 SP3: xen 4.9.4_12-3.74.1
  SUSE LE 12 SP4: xen 4.11.4_08-2.36.1
  SUSE LE 12 SP5: xen 4.12.3_08-3.24.1
  SUSE LE 15 RTM: xen 4.10.4_16-3.41.1
  SUSE LE 15 SP1: xen 4.12.3_08-3.28.1
  SUSE LE 15 SP2: xen 4.13.1_08-3.10.1

Ubuntu: new qemu packages.
New packages are available:
  Ubuntu 16.04 LTS: qemu 1:2.5+dfsg-5ubuntu10.46
  Ubuntu 18.04 LTS: qemu 1:2.11+dfsg-1ubuntu7.32
  Ubuntu 20.04 LTS: qemu 1:4.2-3ubuntu6.6

Wind River Linux: version 10.19.45.12.
The version 10.19.45.12 is fixed:
  https://support2.windriver.com/index.php?page=cve&on=list&show=50&product_id=1&product_version%5B0%5D=24&id_status%5B0%5D=4&cve_id_filter=&s=&submit=&order_by=cve_modified_date&order_way=desc#list
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability announce. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.