Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:1244-1

Опубликовано: 16 апр. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
  • Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
  • Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
  • Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
  • Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
  • Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
  • Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
  • Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
  • Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
  • Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
  • Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
  • Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
  • Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
  • Fix OOB access in SLIRP ARP/NCSI packet processing (CVE-2020-29129, bsc#1179466, CVE-2020-29130, bsc#1179467)
  • Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
  • Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
  • Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
  • Fix buffer overflow in the XGMAC device (CVE-2020-15863 bsc#1174386)
  • Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
  • Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
  • Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
  • Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
  • Drop the 'ampersand 0x25 shift altgr' line in pt-br keymap file (bsc#1129962)
  • Fix migration failure with error message: 'error while loading state section id 3(ram) (bsc#1154790)
  • Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
  • Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
  • Fix OOB access in ARM interrupt handling (CVE-2021-20221 bsc#1181933)
  • Tweaks to spec file for better formatting, and remove not needed BuildRequires for e2fsprogs-devel and libpcap-devel
  • Use '%service_del_postun_without_restart' instead of '%service_del_postun' to avoid 'Failed to try-restart qemu-ga@.service' error while updating the qemu-guest-agent. (bsc#1178565)
  • Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)

Список пакетов

Image SLES15-EC2-CHOST-HVM-BYOS
qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
qemu-2.11.2-9.43.1
qemu-arm-2.11.2-9.43.1
qemu-block-curl-2.11.2-9.43.1
qemu-block-iscsi-2.11.2-9.43.1
qemu-block-rbd-2.11.2-9.43.1
qemu-block-ssh-2.11.2-9.43.1
qemu-guest-agent-2.11.2-9.43.1
qemu-ipxe-1.0.0+-9.43.1
qemu-kvm-2.11.2-9.43.1
qemu-lang-2.11.2-9.43.1
qemu-seabios-1.11.0_0_g63451fc-9.43.1
qemu-sgabios-8-9.43.1
qemu-tools-2.11.2-9.43.1
qemu-vgabios-1.11.0_0_g63451fc-9.43.1
qemu-x86-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
qemu-2.11.2-9.43.1
qemu-arm-2.11.2-9.43.1
qemu-block-curl-2.11.2-9.43.1
qemu-block-iscsi-2.11.2-9.43.1
qemu-block-rbd-2.11.2-9.43.1
qemu-block-ssh-2.11.2-9.43.1
qemu-guest-agent-2.11.2-9.43.1
qemu-ipxe-1.0.0+-9.43.1
qemu-kvm-2.11.2-9.43.1
qemu-lang-2.11.2-9.43.1
qemu-seabios-1.11.0_0_g63451fc-9.43.1
qemu-sgabios-8-9.43.1
qemu-tools-2.11.2-9.43.1
qemu-vgabios-1.11.0_0_g63451fc-9.43.1
qemu-x86-2.11.2-9.43.1
SUSE Linux Enterprise Server 15-LTSS
qemu-2.11.2-9.43.1
qemu-arm-2.11.2-9.43.1
qemu-block-curl-2.11.2-9.43.1
qemu-block-iscsi-2.11.2-9.43.1
qemu-block-rbd-2.11.2-9.43.1
qemu-block-ssh-2.11.2-9.43.1
qemu-guest-agent-2.11.2-9.43.1
qemu-ipxe-1.0.0+-9.43.1
qemu-kvm-2.11.2-9.43.1
qemu-lang-2.11.2-9.43.1
qemu-ppc-2.11.2-9.43.1
qemu-s390-2.11.2-9.43.1
qemu-seabios-1.11.0_0_g63451fc-9.43.1
qemu-sgabios-8-9.43.1
qemu-tools-2.11.2-9.43.1
qemu-vgabios-1.11.0_0_g63451fc-9.43.1
qemu-x86-2.11.2-9.43.1
SUSE Linux Enterprise Server for SAP Applications 15
qemu-2.11.2-9.43.1
qemu-block-curl-2.11.2-9.43.1
qemu-block-iscsi-2.11.2-9.43.1
qemu-block-rbd-2.11.2-9.43.1
qemu-block-ssh-2.11.2-9.43.1
qemu-guest-agent-2.11.2-9.43.1
qemu-ipxe-1.0.0+-9.43.1
qemu-kvm-2.11.2-9.43.1
qemu-lang-2.11.2-9.43.1
qemu-ppc-2.11.2-9.43.1
qemu-seabios-1.11.0_0_g63451fc-9.43.1
qemu-sgabios-8-9.43.1
qemu-tools-2.11.2-9.43.1
qemu-vgabios-1.11.0_0_g63451fc-9.43.1
qemu-x86-2.11.2-9.43.1

Описание

iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки

Описание

A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.43.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.43.1

Ссылки
Уязвимость SUSE-SU-2021:1244-1