Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:0127-1

Опубликовано: 13 янв. 2017
Источник: suse-cvrf

Описание

Security update for qemu

qemu was updated to fix several issues.

These security issues were fixed:

  • CVE-2016-9102: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number (bsc#1014256).
  • CVE-2016-9103: The v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values writing to them (bsc#1007454).
  • CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
  • CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285).
  • CVE-2016-9845: The Virtio GPU Device emulator support as vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1013767).
  • CVE-2016-9846: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while updating the cursor data in update_cursor_data_virgl. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1013764).
  • CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109).
  • CVE-2016-9908: The Virtio GPU Device emulator support was vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1014514).
  • CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111).
  • CVE-2016-9912: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1014112).
  • CVE-2016-9913: VirtFS was vulnerable to memory leakage issue via its '9p-handle' or '9p-proxy' backend drivers. A privileged user inside guest could have used this flaw to leak host memory, thus affecting other services on the host and/or potentially crash the Qemu process on the host (bsc#1014110).

These non-security issues were fixed:

  • Fixed uint64 property parsing and add regression tests (bsc#937125)
  • Added a man page for kvm_stat
  • Fix crash in vte (bsc#1008519)
  • Various upstream commits targeted towards stable releases (bsc#1013341)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP2
qemu-2.6.2-39.1
qemu-block-curl-2.6.2-39.1
qemu-ipxe-1.0.0-39.1
qemu-kvm-2.6.2-39.1
qemu-seabios-1.9.1-39.1
qemu-sgabios-8-39.1
qemu-tools-2.6.2-39.1
qemu-vgabios-1.9.1-39.1
qemu-x86-2.6.2-39.1
SUSE Linux Enterprise Server 12 SP2
qemu-2.6.2-39.1
qemu-arm-2.6.2-39.1
qemu-block-curl-2.6.2-39.1
qemu-block-rbd-2.6.2-39.1
qemu-block-ssh-2.6.2-39.1
qemu-guest-agent-2.6.2-39.1
qemu-ipxe-1.0.0-39.1
qemu-kvm-2.6.2-39.1
qemu-lang-2.6.2-39.1
qemu-ppc-2.6.2-39.1
qemu-s390-2.6.2-39.1
qemu-seabios-1.9.1-39.1
qemu-sgabios-8-39.1
qemu-tools-2.6.2-39.1
qemu-vgabios-1.9.1-39.1
qemu-x86-2.6.2-39.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
qemu-2.6.2-39.1
qemu-arm-2.6.2-39.1
qemu-block-curl-2.6.2-39.1
qemu-block-rbd-2.6.2-39.1
qemu-block-ssh-2.6.2-39.1
qemu-guest-agent-2.6.2-39.1
qemu-ipxe-1.0.0-39.1
qemu-lang-2.6.2-39.1
qemu-tools-2.6.2-39.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
qemu-2.6.2-39.1
qemu-arm-2.6.2-39.1
qemu-block-curl-2.6.2-39.1
qemu-block-rbd-2.6.2-39.1
qemu-block-ssh-2.6.2-39.1
qemu-guest-agent-2.6.2-39.1
qemu-ipxe-1.0.0-39.1
qemu-kvm-2.6.2-39.1
qemu-lang-2.6.2-39.1
qemu-ppc-2.6.2-39.1
qemu-s390-2.6.2-39.1
qemu-seabios-1.9.1-39.1
qemu-sgabios-8-39.1
qemu-tools-2.6.2-39.1
qemu-vgabios-1.9.1-39.1
qemu-x86-2.6.2-39.1

Описание

Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки

Описание

The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-39.1
SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-39.1

Ссылки