Описание
Security update for qemu
qemu was updated to fix 37 security issues.
These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI DMA I/O (bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI DMA I/O (bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
Список пакетов
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server for SAP Applications 12
Ссылки
- Link for SUSE-SU-2016:1560-1
- E-Mail link for SUSE-SU-2016:1560-1
- SUSE Security Ratings
- SUSE Bug 886378
- SUSE Bug 895528
- SUSE Bug 901508
- SUSE Bug 928393
- SUSE Bug 934069
- SUSE Bug 940929
- SUSE Bug 944463
- SUSE Bug 947159
- SUSE Bug 958491
- SUSE Bug 958917
- SUSE Bug 959005
- SUSE Bug 959386
- SUSE Bug 960334
- SUSE Bug 960708
- SUSE Bug 960725
- SUSE Bug 960835
- SUSE Bug 961332
Описание
The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
Затронутые продукты
Ссылки
- CVE-2014-3615
- SUSE Bug 895528
- SUSE Bug 918998
Описание
The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
Затронутые продукты
Ссылки
- CVE-2014-3689
- SUSE Bug 1072223
- SUSE Bug 1189862
- SUSE Bug 901508
- SUSE Bug 962611
Описание
The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
Затронутые продукты
Ссылки
- CVE-2014-9718
- SUSE Bug 928393
- SUSE Bug 964431
Описание
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
Затронутые продукты
Ссылки
- CVE-2015-3214
- SUSE Bug 934069
- SUSE Bug 936025
Описание
Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
Затронутые продукты
Ссылки
- CVE-2015-5239
- SUSE Bug 944463
- SUSE Bug 950367
Описание
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
Затронутые продукты
Ссылки
- CVE-2015-5745
- SUSE Bug 940929
- SUSE Bug 950367
Описание
hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
Затронутые продукты
Ссылки
- CVE-2015-7295
- SUSE Bug 947159
- SUSE Bug 950367
Описание
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
Затронутые продукты
Ссылки
- CVE-2015-7549
- SUSE Bug 958917
- SUSE Bug 958918
Описание
Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
Затронутые продукты
Ссылки
- CVE-2015-8504
- SUSE Bug 958491
- SUSE Bug 958493
Описание
The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
Затронутые продукты
Ссылки
- CVE-2015-8558
- SUSE Bug 959005
- SUSE Bug 959006
- SUSE Bug 976109
- SUSE Bug 976111
Описание
Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
Затронутые продукты
Ссылки
- CVE-2015-8567
- SUSE Bug 959386
- SUSE Bug 959387
Описание
Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
Затронутые продукты
Ссылки
- CVE-2015-8568
- SUSE Bug 959386
- SUSE Bug 959387
Описание
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
Затронутые продукты
Ссылки
- CVE-2015-8613
- SUSE Bug 961358
- SUSE Bug 961556
Описание
The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
Затронутые продукты
Ссылки
- CVE-2015-8619
- SUSE Bug 960334
- SUSE Bug 965269
Описание
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
Затронутые продукты
Ссылки
- CVE-2015-8743
- SUSE Bug 960725
- SUSE Bug 960726
Описание
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
Затронутые продукты
Ссылки
- CVE-2015-8744
- SUSE Bug 960835
- SUSE Bug 960836
Описание
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
Затронутые продукты
Ссылки
- CVE-2015-8745
- SUSE Bug 960707
- SUSE Bug 960708
Описание
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
Затронутые продукты
Ссылки
- CVE-2015-8817
- SUSE Bug 969121
- SUSE Bug 969122
- SUSE Bug 969125
- SUSE Bug 969126
Описание
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2015-8818
- SUSE Bug 969122
- SUSE Bug 969125
- SUSE Bug 969126
Описание
Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
Затронутые продукты
Ссылки
- CVE-2016-1568
- SUSE Bug 961332
- SUSE Bug 961333
Описание
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
Затронутые продукты
Ссылки
- CVE-2016-1714
- SUSE Bug 961691
- SUSE Bug 961692
Описание
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
Затронутые продукты
Ссылки
- CVE-2016-1922
- SUSE Bug 962320
- SUSE Bug 962321
Описание
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
Затронутые продукты
Ссылки
- CVE-2016-1981
- SUSE Bug 963782
- SUSE Bug 963783
Описание
QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
Затронутые продукты
Ссылки
- CVE-2016-2198
- SUSE Bug 964413
- SUSE Bug 964415
Описание
Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
Затронутые продукты
Ссылки
- CVE-2016-2538
- SUSE Bug 967969
- SUSE Bug 968004
Описание
The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
Затронутые продукты
Ссылки
- CVE-2016-2841
- SUSE Bug 969350
- SUSE Bug 969351
Описание
The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
Затронутые продукты
Ссылки
- CVE-2016-2857
- SUSE Bug 970037
Описание
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
Затронутые продукты
Ссылки
- CVE-2016-2858
- SUSE Bug 970036
Описание
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Затронутые продукты
Ссылки
- CVE-2016-3710
- SUSE Bug 978158
- SUSE Bug 978164
- SUSE Bug 978167
Описание
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Затронутые продукты
Ссылки
- CVE-2016-3712
- SUSE Bug 978160
- SUSE Bug 978164
- SUSE Bug 978167
Описание
Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
Затронутые продукты
Ссылки
- CVE-2016-4001
- SUSE Bug 975128
- SUSE Bug 975130
Описание
Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
Затронутые продукты
Ссылки
- CVE-2016-4002
- SUSE Bug 975136
- SUSE Bug 975138
Описание
The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
Затронутые продукты
Ссылки
- CVE-2016-4020
- SUSE Bug 975700
- SUSE Bug 975907
Описание
The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
Затронутые продукты
Ссылки
- CVE-2016-4037
- SUSE Bug 959005
- SUSE Bug 959006
- SUSE Bug 976109
- SUSE Bug 976111
Описание
The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2016-4439
- SUSE Bug 980711
- SUSE Bug 980716
Описание
The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
Затронутые продукты
Ссылки
- CVE-2016-4441
- SUSE Bug 980723
- SUSE Bug 980724
Описание
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
Затронутые продукты
Ссылки
- CVE-2016-4952
- SUSE Bug 981266
- SUSE Bug 981276