Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2022-0216: Fixed a use after free issue found in hw/scsi/lsi53c895a.c. (bsc#1198038)
- CVE-2022-35414: Fixed an uninitialized read during address translation that leads to a crash. (bsc#1201367)
Список пакетов
Container suse/sle-micro-rancher/5.2:latest
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Server Applications 15 SP3
openSUSE Leap 15.3
openSUSE Leap Micro 5.2
Ссылки
- Link for SUSE-SU-2022:3660-1
- E-Mail link for SUSE-SU-2022:3660-1
- SUSE Security Ratings
- SUSE Bug 1192115
- SUSE Bug 1198038
- SUSE Bug 1201367
- SUSE CVE CVE-2022-0216 page
- SUSE CVE CVE-2022-35414 page
Описание
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2022-0216
- SUSE Bug 1198038
Описание
** DISPUTED ** softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time."
Затронутые продукты
Ссылки
- CVE-2022-35414
- SUSE Bug 1201367