Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:1895-1

Опубликовано: 08 июн. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
  • Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
  • For the record, these issues are fixed in this package already. Most are alternate references to previously mentioned issues: (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019, CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683, CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477, CVE-2020-29129, bsc#1179484, CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975)

Список пакетов

Image SLES15-EC2-CHOST-HVM-BYOS
qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
qemu-2.11.2-9.46.1
qemu-arm-2.11.2-9.46.1
qemu-block-curl-2.11.2-9.46.1
qemu-block-iscsi-2.11.2-9.46.1
qemu-block-rbd-2.11.2-9.46.1
qemu-block-ssh-2.11.2-9.46.1
qemu-guest-agent-2.11.2-9.46.1
qemu-ipxe-1.0.0+-9.46.1
qemu-kvm-2.11.2-9.46.1
qemu-lang-2.11.2-9.46.1
qemu-seabios-1.11.0_0_g63451fc-9.46.1
qemu-sgabios-8-9.46.1
qemu-tools-2.11.2-9.46.1
qemu-vgabios-1.11.0_0_g63451fc-9.46.1
qemu-x86-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
qemu-2.11.2-9.46.1
qemu-arm-2.11.2-9.46.1
qemu-block-curl-2.11.2-9.46.1
qemu-block-iscsi-2.11.2-9.46.1
qemu-block-rbd-2.11.2-9.46.1
qemu-block-ssh-2.11.2-9.46.1
qemu-guest-agent-2.11.2-9.46.1
qemu-ipxe-1.0.0+-9.46.1
qemu-kvm-2.11.2-9.46.1
qemu-lang-2.11.2-9.46.1
qemu-seabios-1.11.0_0_g63451fc-9.46.1
qemu-sgabios-8-9.46.1
qemu-tools-2.11.2-9.46.1
qemu-vgabios-1.11.0_0_g63451fc-9.46.1
qemu-x86-2.11.2-9.46.1
SUSE Linux Enterprise Server 15-LTSS
qemu-2.11.2-9.46.1
qemu-arm-2.11.2-9.46.1
qemu-block-curl-2.11.2-9.46.1
qemu-block-iscsi-2.11.2-9.46.1
qemu-block-rbd-2.11.2-9.46.1
qemu-block-ssh-2.11.2-9.46.1
qemu-guest-agent-2.11.2-9.46.1
qemu-ipxe-1.0.0+-9.46.1
qemu-kvm-2.11.2-9.46.1
qemu-lang-2.11.2-9.46.1
qemu-ppc-2.11.2-9.46.1
qemu-s390-2.11.2-9.46.1
qemu-seabios-1.11.0_0_g63451fc-9.46.1
qemu-sgabios-8-9.46.1
qemu-tools-2.11.2-9.46.1
qemu-vgabios-1.11.0_0_g63451fc-9.46.1
qemu-x86-2.11.2-9.46.1
SUSE Linux Enterprise Server for SAP Applications 15
qemu-2.11.2-9.46.1
qemu-block-curl-2.11.2-9.46.1
qemu-block-iscsi-2.11.2-9.46.1
qemu-block-rbd-2.11.2-9.46.1
qemu-block-ssh-2.11.2-9.46.1
qemu-guest-agent-2.11.2-9.46.1
qemu-ipxe-1.0.0+-9.46.1
qemu-kvm-2.11.2-9.46.1
qemu-lang-2.11.2-9.46.1
qemu-ppc-2.11.2-9.46.1
qemu-seabios-1.11.0_0_g63451fc-9.46.1
qemu-sgabios-8-9.46.1
qemu-tools-2.11.2-9.46.1
qemu-vgabios-1.11.0_0_g63451fc-9.46.1
qemu-x86-2.11.2-9.46.1

Описание

libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:qemu-tools-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-arm-2.11.2-9.46.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:qemu-block-curl-2.11.2-9.46.1

Ссылки
Уязвимость SUSE-SU-2021:1895-1