Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:3519-1

Опубликовано: 26 окт. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • CVE-2021-3713: Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702)
  • CVE-2021-3748: Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938)

Список пакетов

Image SLES12-SP5-EC2-ECS-On-Demand
qemu-tools-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5
qemu-3.1.1.1-60.2
qemu-arm-3.1.1.1-60.2
qemu-audio-alsa-3.1.1.1-60.2
qemu-audio-oss-3.1.1.1-60.2
qemu-audio-pa-3.1.1.1-60.2
qemu-audio-sdl-3.1.1.1-60.2
qemu-block-curl-3.1.1.1-60.2
qemu-block-iscsi-3.1.1.1-60.2
qemu-block-rbd-3.1.1.1-60.2
qemu-block-ssh-3.1.1.1-60.2
qemu-guest-agent-3.1.1.1-60.2
qemu-ipxe-1.0.0+-60.2
qemu-kvm-3.1.1.1-60.2
qemu-lang-3.1.1.1-60.2
qemu-ppc-3.1.1.1-60.2
qemu-s390-3.1.1.1-60.2
qemu-seabios-1.12.0_0_ga698c89-60.2
qemu-sgabios-8-60.2
qemu-tools-3.1.1.1-60.2
qemu-ui-curses-3.1.1.1-60.2
qemu-ui-gtk-3.1.1.1-60.2
qemu-ui-sdl-3.1.1.1-60.2
qemu-vgabios-1.12.0_0_ga698c89-60.2
qemu-x86-3.1.1.1-60.2
SUSE Linux Enterprise Server for SAP Applications 12 SP5
qemu-3.1.1.1-60.2
qemu-arm-3.1.1.1-60.2
qemu-audio-alsa-3.1.1.1-60.2
qemu-audio-oss-3.1.1.1-60.2
qemu-audio-pa-3.1.1.1-60.2
qemu-audio-sdl-3.1.1.1-60.2
qemu-block-curl-3.1.1.1-60.2
qemu-block-iscsi-3.1.1.1-60.2
qemu-block-rbd-3.1.1.1-60.2
qemu-block-ssh-3.1.1.1-60.2
qemu-guest-agent-3.1.1.1-60.2
qemu-ipxe-1.0.0+-60.2
qemu-kvm-3.1.1.1-60.2
qemu-lang-3.1.1.1-60.2
qemu-ppc-3.1.1.1-60.2
qemu-s390-3.1.1.1-60.2
qemu-seabios-1.12.0_0_ga698c89-60.2
qemu-sgabios-8-60.2
qemu-tools-3.1.1.1-60.2
qemu-ui-curses-3.1.1.1-60.2
qemu-ui-gtk-3.1.1.1-60.2
qemu-ui-sdl-3.1.1.1-60.2
qemu-vgabios-1.12.0_0_ga698c89-60.2
qemu-x86-3.1.1.1-60.2

Описание

An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-60.2

Ссылки

Описание

A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-60.2
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-60.2

Ссылки