Headline
Ubuntu Security Notice USN-6977-1
Ubuntu Security Notice 6977-1 - It was discovered that QEMU did not properly handle certain memory operations, which could result in a buffer overflow. An attacker could potentially use this issue to cause a denial of service. It was discovered that QEMU did not properly handle certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service.
==========================================================================
Ubuntu Security Notice USN-6977-1
August 22, 2024
qemu vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description:
- qemu: Machine emulator and virtualizer
Details:
It was discovered that QEMU did not properly handle certain memory
operations, which could result in a buffer overflow. An attacker could
potentially use this issue to cause a denial of service. (CVE-2024-26327)
It was discovered that QEMU did not properly handle certain memory
operations, which could result in an out-of-bounds memory access. An
attacker could potentially use this issue to cause a denial of service.
(CVE-2024-26328)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
qemu-system 1:8.2.2+ds-0ubuntu1.2
qemu-system-arm 1:8.2.2+ds-0ubuntu1.2
qemu-system-mips 1:8.2.2+ds-0ubuntu1.2
qemu-system-misc 1:8.2.2+ds-0ubuntu1.2
qemu-system-ppc 1:8.2.2+ds-0ubuntu1.2
qemu-system-s390x 1:8.2.2+ds-0ubuntu1.2
qemu-system-sparc 1:8.2.2+ds-0ubuntu1.2
qemu-system-x86 1:8.2.2+ds-0ubuntu1.2
After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6977-1
CVE-2024-26327, CVE-2024-26328
Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.2