Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2022-0216: Fixed a use after free issue found in hw/scsi/lsi53c895a.c. (bsc#1198038)
- CVE-2022-35414: Fixed an uninitialized read during address translation that leads to a crash. (bsc#1201367)
Список пакетов
Container suse/sle-micro-rancher/5.3:latest
Container suse/sle-micro-rancher/5.4:latest
Image SLES15-SP4-EC2-ECS-HVM
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15 SP4
SUSE Linux Enterprise Module for Server Applications 15 SP4
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2022:3795-1
- E-Mail link for SUSE-SU-2022:3795-1
- SUSE Security Ratings
- SUSE Bug 1192115
- SUSE Bug 1198038
- SUSE Bug 1201367
- SUSE CVE CVE-2022-0216 page
- SUSE CVE CVE-2022-35414 page
Описание
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2022-0216
- SUSE Bug 1198038
Описание
** DISPUTED ** softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time."
Затронутые продукты
Ссылки
- CVE-2022-35414
- SUSE Bug 1201367