Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:2973-1

Опубликовано: 02 окт. 2018
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following security issues:

  • CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have been exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket causing DoS (bsc#1098735)
  • CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from upstream (CVE-2018-3639, bsc#1092885).

Список пакетов

SUSE Enterprise Storage 4
qemu-2.6.2-41.43.3
qemu-block-curl-2.6.2-41.43.3
qemu-block-rbd-2.6.2-41.43.3
qemu-block-ssh-2.6.2-41.43.3
qemu-guest-agent-2.6.2-41.43.3
qemu-ipxe-1.0.0-41.43.3
qemu-kvm-2.6.2-41.43.3
qemu-lang-2.6.2-41.43.3
qemu-seabios-1.9.1-41.43.3
qemu-sgabios-8-41.43.3
qemu-tools-2.6.2-41.43.3
qemu-vgabios-1.9.1-41.43.3
qemu-x86-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-LTSS
qemu-2.6.2-41.43.3
qemu-block-curl-2.6.2-41.43.3
qemu-block-rbd-2.6.2-41.43.3
qemu-block-ssh-2.6.2-41.43.3
qemu-guest-agent-2.6.2-41.43.3
qemu-ipxe-1.0.0-41.43.3
qemu-kvm-2.6.2-41.43.3
qemu-lang-2.6.2-41.43.3
qemu-ppc-2.6.2-41.43.3
qemu-s390-2.6.2-41.43.3
qemu-seabios-1.9.1-41.43.3
qemu-sgabios-8-41.43.3
qemu-tools-2.6.2-41.43.3
qemu-vgabios-1.9.1-41.43.3
qemu-x86-2.6.2-41.43.3
SUSE Linux Enterprise Server for SAP Applications 12 SP2
qemu-2.6.2-41.43.3
qemu-block-curl-2.6.2-41.43.3
qemu-block-rbd-2.6.2-41.43.3
qemu-block-ssh-2.6.2-41.43.3
qemu-guest-agent-2.6.2-41.43.3
qemu-ipxe-1.0.0-41.43.3
qemu-kvm-2.6.2-41.43.3
qemu-lang-2.6.2-41.43.3
qemu-ppc-2.6.2-41.43.3
qemu-seabios-1.9.1-41.43.3
qemu-sgabios-8-41.43.3
qemu-tools-2.6.2-41.43.3
qemu-vgabios-1.9.1-41.43.3
qemu-x86-2.6.2-41.43.3
SUSE OpenStack Cloud 7
qemu-2.6.2-41.43.3
qemu-block-curl-2.6.2-41.43.3
qemu-block-rbd-2.6.2-41.43.3
qemu-block-ssh-2.6.2-41.43.3
qemu-guest-agent-2.6.2-41.43.3
qemu-ipxe-1.0.0-41.43.3
qemu-kvm-2.6.2-41.43.3
qemu-lang-2.6.2-41.43.3
qemu-s390-2.6.2-41.43.3
qemu-seabios-1.9.1-41.43.3
qemu-sgabios-8-41.43.3
qemu-tools-2.6.2-41.43.3
qemu-vgabios-1.9.1-41.43.3
qemu-x86-2.6.2-41.43.3

Описание

m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.


Затронутые продукты
SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3

Ссылки

Описание

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.


Затронутые продукты
SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3
SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3

Ссылки
Уязвимость SUSE-SU-2018:2973-1