Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0671-1

Опубликовано: 08 мар. 2023
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • CVE-2022-4144: Fixed qxl_phys2virt unsafe address translation that can lead to out-of-bounds read (bsc#1205808).
  • CVE-2022-3165: Fixed integer underflow in vnc_client_cut_text_ext() (bsc#1203788).
  • CVE-2022-1050: Fixed use-after-free issue in pvrdma_exec_cmd() (bsc#1197653).

Bugfixes:

  • Fixed deviation of guest clock (bsc#1206527).
  • Fixed broken 'block limits' VPD emulation (bsc#1202364).

Список пакетов

Container suse/sle-micro-rancher/5.3:latest
qemu-guest-agent-6.2.0-150400.37.11.1
Container suse/sle-micro-rancher/5.4:latest
qemu-guest-agent-6.2.0-150400.37.11.1
Image SLES15-SP4-EC2-ECS-HVM
qemu-tools-6.2.0-150400.37.11.1
SUSE Linux Enterprise Micro 5.3
qemu-6.2.0-150400.37.11.1
qemu-accel-tcg-x86-6.2.0-150400.37.11.1
qemu-arm-6.2.0-150400.37.11.1
qemu-audio-spice-6.2.0-150400.37.11.1
qemu-chardev-spice-6.2.0-150400.37.11.1
qemu-guest-agent-6.2.0-150400.37.11.1
qemu-hw-display-qxl-6.2.0-150400.37.11.1
qemu-hw-display-virtio-gpu-6.2.0-150400.37.11.1
qemu-hw-display-virtio-vga-6.2.0-150400.37.11.1
qemu-hw-usb-redirect-6.2.0-150400.37.11.1
qemu-ipxe-1.0.0+-150400.37.11.1
qemu-s390x-6.2.0-150400.37.11.1
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-sgabios-8-150400.37.11.1
qemu-tools-6.2.0-150400.37.11.1
qemu-ui-opengl-6.2.0-150400.37.11.1
qemu-ui-spice-core-6.2.0-150400.37.11.1
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-x86-6.2.0-150400.37.11.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
qemu-tools-6.2.0-150400.37.11.1
SUSE Linux Enterprise Module for Server Applications 15 SP4
qemu-6.2.0-150400.37.11.1
qemu-SLOF-6.2.0-150400.37.11.1
qemu-accel-tcg-x86-6.2.0-150400.37.11.1
qemu-arm-6.2.0-150400.37.11.1
qemu-audio-alsa-6.2.0-150400.37.11.1
qemu-audio-pa-6.2.0-150400.37.11.1
qemu-audio-spice-6.2.0-150400.37.11.1
qemu-block-curl-6.2.0-150400.37.11.1
qemu-block-iscsi-6.2.0-150400.37.11.1
qemu-block-rbd-6.2.0-150400.37.11.1
qemu-block-ssh-6.2.0-150400.37.11.1
qemu-chardev-baum-6.2.0-150400.37.11.1
qemu-chardev-spice-6.2.0-150400.37.11.1
qemu-guest-agent-6.2.0-150400.37.11.1
qemu-hw-display-qxl-6.2.0-150400.37.11.1
qemu-hw-display-virtio-gpu-6.2.0-150400.37.11.1
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.11.1
qemu-hw-display-virtio-vga-6.2.0-150400.37.11.1
qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.11.1
qemu-hw-usb-host-6.2.0-150400.37.11.1
qemu-hw-usb-redirect-6.2.0-150400.37.11.1
qemu-ipxe-1.0.0+-150400.37.11.1
qemu-ksm-6.2.0-150400.37.11.1
qemu-kvm-6.2.0-150400.37.11.1
qemu-lang-6.2.0-150400.37.11.1
qemu-ppc-6.2.0-150400.37.11.1
qemu-s390x-6.2.0-150400.37.11.1
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-sgabios-8-150400.37.11.1
qemu-skiboot-6.2.0-150400.37.11.1
qemu-ui-curses-6.2.0-150400.37.11.1
qemu-ui-gtk-6.2.0-150400.37.11.1
qemu-ui-opengl-6.2.0-150400.37.11.1
qemu-ui-spice-app-6.2.0-150400.37.11.1
qemu-ui-spice-core-6.2.0-150400.37.11.1
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-x86-6.2.0-150400.37.11.1
openSUSE Leap 15.4
qemu-6.2.0-150400.37.11.1
qemu-SLOF-6.2.0-150400.37.11.1
qemu-accel-qtest-6.2.0-150400.37.11.1
qemu-accel-tcg-x86-6.2.0-150400.37.11.1
qemu-arm-6.2.0-150400.37.11.1
qemu-audio-alsa-6.2.0-150400.37.11.1
qemu-audio-jack-6.2.0-150400.37.11.1
qemu-audio-pa-6.2.0-150400.37.11.1
qemu-audio-spice-6.2.0-150400.37.11.1
qemu-block-curl-6.2.0-150400.37.11.1
qemu-block-dmg-6.2.0-150400.37.11.1
qemu-block-gluster-6.2.0-150400.37.11.1
qemu-block-iscsi-6.2.0-150400.37.11.1
qemu-block-nfs-6.2.0-150400.37.11.1
qemu-block-rbd-6.2.0-150400.37.11.1
qemu-block-ssh-6.2.0-150400.37.11.1
qemu-chardev-baum-6.2.0-150400.37.11.1
qemu-chardev-spice-6.2.0-150400.37.11.1
qemu-extra-6.2.0-150400.37.11.1
qemu-guest-agent-6.2.0-150400.37.11.1
qemu-hw-display-qxl-6.2.0-150400.37.11.1
qemu-hw-display-virtio-gpu-6.2.0-150400.37.11.1
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.11.1
qemu-hw-display-virtio-vga-6.2.0-150400.37.11.1
qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.11.1
qemu-hw-usb-host-6.2.0-150400.37.11.1
qemu-hw-usb-redirect-6.2.0-150400.37.11.1
qemu-hw-usb-smartcard-6.2.0-150400.37.11.1
qemu-ipxe-1.0.0+-150400.37.11.1
qemu-ivshmem-tools-6.2.0-150400.37.11.1
qemu-ksm-6.2.0-150400.37.11.1
qemu-kvm-6.2.0-150400.37.11.1
qemu-lang-6.2.0-150400.37.11.1
qemu-linux-user-6.2.0-150400.37.11.1
qemu-microvm-6.2.0-150400.37.11.1
qemu-ppc-6.2.0-150400.37.11.1
qemu-s390x-6.2.0-150400.37.11.1
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-sgabios-8-150400.37.11.1
qemu-skiboot-6.2.0-150400.37.11.1
qemu-testsuite-6.2.0-150400.37.11.2
qemu-tools-6.2.0-150400.37.11.1
qemu-ui-curses-6.2.0-150400.37.11.1
qemu-ui-gtk-6.2.0-150400.37.11.1
qemu-ui-opengl-6.2.0-150400.37.11.1
qemu-ui-spice-app-6.2.0-150400.37.11.1
qemu-ui-spice-core-6.2.0-150400.37.11.1
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-vhost-user-gpu-6.2.0-150400.37.11.1
qemu-x86-6.2.0-150400.37.11.1
openSUSE Leap Micro 5.3
qemu-6.2.0-150400.37.11.1
qemu-accel-tcg-x86-6.2.0-150400.37.11.1
qemu-arm-6.2.0-150400.37.11.1
qemu-audio-spice-6.2.0-150400.37.11.1
qemu-chardev-spice-6.2.0-150400.37.11.1
qemu-guest-agent-6.2.0-150400.37.11.1
qemu-hw-display-qxl-6.2.0-150400.37.11.1
qemu-hw-display-virtio-gpu-6.2.0-150400.37.11.1
qemu-hw-display-virtio-vga-6.2.0-150400.37.11.1
qemu-hw-usb-redirect-6.2.0-150400.37.11.1
qemu-ipxe-1.0.0+-150400.37.11.1
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-sgabios-8-150400.37.11.1
qemu-tools-6.2.0-150400.37.11.1
qemu-ui-opengl-6.2.0-150400.37.11.1
qemu-ui-spice-core-6.2.0-150400.37.11.1
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.11.1
qemu-x86-6.2.0-150400.37.11.1

Описание

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.


Затронутые продукты
Container suse/sle-micro-rancher/5.3:latest:qemu-guest-agent-6.2.0-150400.37.11.1
Container suse/sle-micro-rancher/5.4:latest:qemu-guest-agent-6.2.0-150400.37.11.1
Image SLES15-SP4-EC2-ECS-HVM:qemu-tools-6.2.0-150400.37.11.1
SUSE Linux Enterprise Micro 5.3:qemu-6.2.0-150400.37.11.1

Ссылки

Описание

An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.


Затронутые продукты
Container suse/sle-micro-rancher/5.3:latest:qemu-guest-agent-6.2.0-150400.37.11.1
Container suse/sle-micro-rancher/5.4:latest:qemu-guest-agent-6.2.0-150400.37.11.1
Image SLES15-SP4-EC2-ECS-HVM:qemu-tools-6.2.0-150400.37.11.1
SUSE Linux Enterprise Micro 5.3:qemu-6.2.0-150400.37.11.1

Ссылки

Описание

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.


Затронутые продукты
Container suse/sle-micro-rancher/5.3:latest:qemu-guest-agent-6.2.0-150400.37.11.1
Container suse/sle-micro-rancher/5.4:latest:qemu-guest-agent-6.2.0-150400.37.11.1
Image SLES15-SP4-EC2-ECS-HVM:qemu-tools-6.2.0-150400.37.11.1
SUSE Linux Enterprise Micro 5.3:qemu-6.2.0-150400.37.11.1

Ссылки
Уязвимость SUSE-SU-2023:0671-1