Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2020-13361: Fixed an OOB access possibility in ES1370 audio device emulation (bsc#1172384).
- CVE-2020-14364: Fixed an OOB access while processing USB packets (bsc#1175441).
- CVE-2020-16092: Fixed a denial of service in packet processing of various emulated NICs (bsc#1174641).
- CVE-2020-15863: Fixed a buffer overflow in the XGMAC device (bsc#1174386).
- Fix OOB access in ROM loading
Список пакетов
Image SLES12-SP5-EC2-ECS-On-Demand
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
Ссылки
- Link for SUSE-SU-2020:2743-1
- E-Mail link for SUSE-SU-2020:2743-1
- SUSE Security Ratings
- SUSE Bug 1172384
- SUSE Bug 1174386
- SUSE Bug 1174641
- SUSE Bug 1175441
- SUSE CVE CVE-2020-13361 page
- SUSE CVE CVE-2020-14364 page
- SUSE CVE CVE-2020-15863 page
- SUSE CVE CVE-2020-16092 page
Описание
In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
Затронутые продукты
Ссылки
- CVE-2020-13361
- SUSE Bug 1172384
Описание
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Затронутые продукты
Ссылки
- CVE-2020-14364
- SUSE Bug 1175441
- SUSE Bug 1175534
- SUSE Bug 1176494
- SUSE Bug 1177130
Описание
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
Затронутые продукты
Ссылки
- CVE-2020-15863
- SUSE Bug 1174386
Описание
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
Затронутые продукты
Ссылки
- CVE-2020-16092
- SUSE Bug 1174641