Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:1837-1

Опубликовано: 02 июн. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • Fix out-of-bounds access issue while doing multi block SDMA (CVE-2020-25085, bsc#1176681)
  • Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
  • QEMU BIOS fails to read stage2 loader on s390x (bsc#1186290)
  • Change dependency from CONFIG_VFIO back to CONFIG_LINUX (bsc#1179725)
  • For the record, these issues are fixed in this package already. Most are alternate references to previously mentioned issues: (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019, CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683, CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477, CVE-2020-29129, bsc#1179484, CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975)

Список пакетов

Image SLES12-SP5-EC2-ECS-On-Demand
qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5
qemu-3.1.1.1-51.1
qemu-arm-3.1.1.1-51.1
qemu-audio-alsa-3.1.1.1-51.1
qemu-audio-oss-3.1.1.1-51.1
qemu-audio-pa-3.1.1.1-51.1
qemu-audio-sdl-3.1.1.1-51.1
qemu-block-curl-3.1.1.1-51.1
qemu-block-iscsi-3.1.1.1-51.1
qemu-block-rbd-3.1.1.1-51.1
qemu-block-ssh-3.1.1.1-51.1
qemu-guest-agent-3.1.1.1-51.1
qemu-ipxe-1.0.0+-51.1
qemu-kvm-3.1.1.1-51.1
qemu-lang-3.1.1.1-51.1
qemu-ppc-3.1.1.1-51.1
qemu-s390-3.1.1.1-51.1
qemu-seabios-1.12.0_0_ga698c89-51.1
qemu-sgabios-8-51.1
qemu-tools-3.1.1.1-51.1
qemu-ui-curses-3.1.1.1-51.1
qemu-ui-gtk-3.1.1.1-51.1
qemu-ui-sdl-3.1.1.1-51.1
qemu-vgabios-1.12.0_0_ga698c89-51.1
qemu-x86-3.1.1.1-51.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
qemu-3.1.1.1-51.1
qemu-arm-3.1.1.1-51.1
qemu-audio-alsa-3.1.1.1-51.1
qemu-audio-oss-3.1.1.1-51.1
qemu-audio-pa-3.1.1.1-51.1
qemu-audio-sdl-3.1.1.1-51.1
qemu-block-curl-3.1.1.1-51.1
qemu-block-iscsi-3.1.1.1-51.1
qemu-block-rbd-3.1.1.1-51.1
qemu-block-ssh-3.1.1.1-51.1
qemu-guest-agent-3.1.1.1-51.1
qemu-ipxe-1.0.0+-51.1
qemu-kvm-3.1.1.1-51.1
qemu-lang-3.1.1.1-51.1
qemu-ppc-3.1.1.1-51.1
qemu-s390-3.1.1.1-51.1
qemu-seabios-1.12.0_0_ga698c89-51.1
qemu-sgabios-8-51.1
qemu-tools-3.1.1.1-51.1
qemu-ui-curses-3.1.1.1-51.1
qemu-ui-gtk-3.1.1.1-51.1
qemu-ui-sdl-3.1.1.1-51.1
qemu-vgabios-1.12.0_0_ga698c89-51.1
qemu-x86-3.1.1.1-51.1

Описание

libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-51.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-51.1

Ссылки
Уязвимость SUSE-SU-2021:1837-1