Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2022-0358: Fixed a potential privilege escalation via virtiofsd (bsc#1195161).
- CVE-2021-3930: Fixed a potential denial of service in the emulated SCSI device (bsc#1192525).
Non-security fixes:
- Fixed a kernel data corruption via a long kernel boot cmdline (bsc#1196737).
- Included vmxcap in the qemu-tools package (bsc#1193364).
- Fixed package dependencies (bsc#1196087).
- Fixed an issue were PowerPC firmwares would not be built for non-PowerPC builds (bsc#1193545).
- Fixed multiple issues in I/O (bsc#1178049 bsc#1194938).
Список пакетов
Container suse/sle-micro-rancher/5.2:latest
Image SLES15-SP3-EC2-ECS-HVM
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Server Applications 15 SP3
Ссылки
- Link for SUSE-SU-2022:0930-1
- E-Mail link for SUSE-SU-2022:0930-1
- SUSE Security Ratings
- SUSE Bug 1178049
- SUSE Bug 1192525
- SUSE Bug 1193364
- SUSE Bug 1193545
- SUSE Bug 1194938
- SUSE Bug 1195161
- SUSE Bug 1196087
- SUSE Bug 1196737
- SUSE CVE CVE-2021-3930 page
- SUSE CVE CVE-2022-0358 page
Описание
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
Затронутые продукты
Ссылки
- CVE-2021-3930
- SUSE Bug 1192525
- SUSE Bug 1192526
Описание
A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.
Затронутые продукты
Ссылки
- CVE-2022-0358
- SUSE Bug 1195161