Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2021-3546: Fixed out-of-bounds write in virgl_cmd_get_capset (bsc#1185981).
- CVE-2021-3544: Fixed memory leaks found in the virtio vhost-user GPU device (bsc#1186010).
- CVE-2021-3545: Fixed information disclosure due to uninitialized memory read (bsc#1185990).
Список пакетов
Container suse/sle-micro-rancher/5.2:latest
Container suse/sles/15.3/cdi-importer:1.37.1
Container suse/sles/15.3/cdi-uploadserver:1.37.1
Container suse/sles/15.3/libguestfs-tools:0.45.0
Container suse/sles/15.3/virt-handler:0.45.0
Container suse/sles/15.3/virt-launcher:0.45.0
Image SLES15-SP3-EC2-ECS-HVM
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Server Applications 15 SP3
Ссылки
- Link for SUSE-SU-2021:2213-1
- E-Mail link for SUSE-SU-2021:2213-1
- SUSE Security Ratings
- SUSE Bug 1185981
- SUSE Bug 1185990
- SUSE Bug 1186010
- SUSE CVE CVE-2021-3544 page
- SUSE CVE CVE-2021-3545 page
- SUSE CVE CVE-2021-3546 page
Описание
Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.
Затронутые продукты
Ссылки
- CVE-2021-3544
- SUSE Bug 1186010
Описание
An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
Затронутые продукты
Ссылки
- CVE-2021-3545
- SUSE Bug 1185990
Описание
An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
Затронутые продукты
Ссылки
- CVE-2021-3546
- SUSE Bug 1185981