Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:3653-1

Опубликовано: 10 нояб. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

Security issues fixed:

  • Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
  • Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)

Список пакетов

HPE Helion OpenStack 8
qemu-2.9.1-43.62.1
qemu-block-curl-2.9.1-43.62.1
qemu-block-iscsi-2.9.1-43.62.1
qemu-block-rbd-2.9.1-43.62.1
qemu-block-ssh-2.9.1-43.62.1
qemu-guest-agent-2.9.1-43.62.1
qemu-ipxe-1.0.0+-43.62.1
qemu-kvm-2.9.1-43.62.1
qemu-lang-2.9.1-43.62.1
qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-sgabios-8-43.62.1
qemu-tools-2.9.1-43.62.1
qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-x86-2.9.1-43.62.1
SUSE Linux Enterprise Server 12 SP3-BCL
qemu-2.9.1-43.62.1
qemu-block-curl-2.9.1-43.62.1
qemu-block-iscsi-2.9.1-43.62.1
qemu-block-rbd-2.9.1-43.62.1
qemu-block-ssh-2.9.1-43.62.1
qemu-guest-agent-2.9.1-43.62.1
qemu-ipxe-1.0.0+-43.62.1
qemu-kvm-2.9.1-43.62.1
qemu-lang-2.9.1-43.62.1
qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-sgabios-8-43.62.1
qemu-tools-2.9.1-43.62.1
qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-x86-2.9.1-43.62.1
SUSE Linux Enterprise Server 12 SP3-LTSS
qemu-2.9.1-43.62.1
qemu-arm-2.9.1-43.62.1
qemu-block-curl-2.9.1-43.62.1
qemu-block-iscsi-2.9.1-43.62.1
qemu-block-rbd-2.9.1-43.62.1
qemu-block-ssh-2.9.1-43.62.1
qemu-guest-agent-2.9.1-43.62.1
qemu-ipxe-1.0.0+-43.62.1
qemu-kvm-2.9.1-43.62.1
qemu-lang-2.9.1-43.62.1
qemu-ppc-2.9.1-43.62.1
qemu-s390-2.9.1-43.62.1
qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-sgabios-8-43.62.1
qemu-tools-2.9.1-43.62.1
qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-x86-2.9.1-43.62.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
qemu-2.9.1-43.62.1
qemu-block-curl-2.9.1-43.62.1
qemu-block-iscsi-2.9.1-43.62.1
qemu-block-rbd-2.9.1-43.62.1
qemu-block-ssh-2.9.1-43.62.1
qemu-guest-agent-2.9.1-43.62.1
qemu-ipxe-1.0.0+-43.62.1
qemu-kvm-2.9.1-43.62.1
qemu-lang-2.9.1-43.62.1
qemu-ppc-2.9.1-43.62.1
qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-sgabios-8-43.62.1
qemu-tools-2.9.1-43.62.1
qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-x86-2.9.1-43.62.1
SUSE OpenStack Cloud 8
qemu-2.9.1-43.62.1
qemu-block-curl-2.9.1-43.62.1
qemu-block-iscsi-2.9.1-43.62.1
qemu-block-rbd-2.9.1-43.62.1
qemu-block-ssh-2.9.1-43.62.1
qemu-guest-agent-2.9.1-43.62.1
qemu-ipxe-1.0.0+-43.62.1
qemu-kvm-2.9.1-43.62.1
qemu-lang-2.9.1-43.62.1
qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-sgabios-8-43.62.1
qemu-tools-2.9.1-43.62.1
qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-x86-2.9.1-43.62.1
SUSE OpenStack Cloud Crowbar 8
qemu-2.9.1-43.62.1
qemu-block-curl-2.9.1-43.62.1
qemu-block-iscsi-2.9.1-43.62.1
qemu-block-rbd-2.9.1-43.62.1
qemu-block-ssh-2.9.1-43.62.1
qemu-guest-agent-2.9.1-43.62.1
qemu-ipxe-1.0.0+-43.62.1
qemu-kvm-2.9.1-43.62.1
qemu-lang-2.9.1-43.62.1
qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-sgabios-8-43.62.1
qemu-tools-2.9.1-43.62.1
qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1
qemu-x86-2.9.1-43.62.1

Описание

An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.


Затронутые продукты
HPE Helion OpenStack 8:qemu-2.9.1-43.62.1
HPE Helion OpenStack 8:qemu-block-curl-2.9.1-43.62.1
HPE Helion OpenStack 8:qemu-block-iscsi-2.9.1-43.62.1
HPE Helion OpenStack 8:qemu-block-rbd-2.9.1-43.62.1

Ссылки

Описание

A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.


Затронутые продукты
HPE Helion OpenStack 8:qemu-2.9.1-43.62.1
HPE Helion OpenStack 8:qemu-block-curl-2.9.1-43.62.1
HPE Helion OpenStack 8:qemu-block-iscsi-2.9.1-43.62.1
HPE Helion OpenStack 8:qemu-block-rbd-2.9.1-43.62.1

Ссылки
Уязвимость SUSE-SU-2021:3653-1