Описание
Security update for qemu
This update for qemu fixes the following issues:
Security issues fixed:
- CVE-2021-3546: Fix out-of-bounds write in virgl_cmd_get_capset (bsc#1185981)
- CVE-2021-3544: Fix memory leaks found in the virtio vhost-user GPU device (bsc#1186010)
- CVE-2021-3545: Fix information disclosure due to uninitialized memory read (bsc#1185990)
Non-security issues fixed:
- Fix testsuite error (bsc#1184574)
- Fix qemu crash with iothread when block commit after snapshot (bsc#1187013)
- Fix qemu hang while cancelling migrating hugepage vm (bsc#1185591)
- Use RCU to avoid race during scsi hotplug/hotunplug (bsc#1184574)
Список пакетов
SUSE Linux Enterprise Micro 5.0
SUSE Linux Enterprise Module for Basesystem 15 SP2
SUSE Linux Enterprise Module for Server Applications 15 SP2
Ссылки
- Link for SUSE-SU-2021:2212-1
- E-Mail link for SUSE-SU-2021:2212-1
- SUSE Security Ratings
- SUSE Bug 1184574
- SUSE Bug 1185591
- SUSE Bug 1185981
- SUSE Bug 1185990
- SUSE Bug 1186010
- SUSE Bug 1187013
- SUSE CVE CVE-2021-3544 page
- SUSE CVE CVE-2021-3545 page
- SUSE CVE CVE-2021-3546 page
Описание
Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.
Затронутые продукты
Ссылки
- CVE-2021-3544
- SUSE Bug 1186010
Описание
An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
Затронутые продукты
Ссылки
- CVE-2021-3545
- SUSE Bug 1185990
Описание
An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
Затронутые продукты
Ссылки
- CVE-2021-3546
- SUSE Bug 1185981