Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:14772-1

Опубликовано: 03 авг. 2021
Источник: suse-cvrf

Описание

Security update for kvm

This update for kvm fixes the following issues:

  • CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
  • CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
  • CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)
  • CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)
  • CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)
  • CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)
  • CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)
  • CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)

Список пакетов

SUSE Linux Enterprise Server 11 SP4-LTSS
kvm-1.4.2-60.37.1

Описание

iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки

Описание

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.37.1

Ссылки
Уязвимость SUSE-SU-2021:14772-1