Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:2973-2

Опубликовано: 18 окт. 2018
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following security issues:

  • CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have been exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket causing DoS (bsc#1098735)
  • CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from upstream (CVE-2018-3639, bsc#1092885).

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
qemu-2.6.2-41.43.3
qemu-block-curl-2.6.2-41.43.3
qemu-block-rbd-2.6.2-41.43.3
qemu-block-ssh-2.6.2-41.43.3
qemu-guest-agent-2.6.2-41.43.3
qemu-ipxe-1.0.0-41.43.3
qemu-kvm-2.6.2-41.43.3
qemu-lang-2.6.2-41.43.3
qemu-seabios-1.9.1-41.43.3
qemu-sgabios-8-41.43.3
qemu-tools-2.6.2-41.43.3
qemu-vgabios-1.9.1-41.43.3
qemu-x86-2.6.2-41.43.3

Описание

m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3

Ссылки

Описание

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3
SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3

Ссылки