Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0877-1

Опубликовано: 23 мар. 2023
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • CVE-2022-4144: Fixed unsafe address translation that can lead to out-of-bounds read in qxl_phys2virt (bsc#1205808).

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
qemu-3.1.1.1-150100.80.46.1
qemu-arm-3.1.1.1-150100.80.46.1
qemu-audio-alsa-3.1.1.1-150100.80.46.1
qemu-audio-oss-3.1.1.1-150100.80.46.1
qemu-audio-pa-3.1.1.1-150100.80.46.1
qemu-block-curl-3.1.1.1-150100.80.46.1
qemu-block-iscsi-3.1.1.1-150100.80.46.1
qemu-block-rbd-3.1.1.1-150100.80.46.1
qemu-block-ssh-3.1.1.1-150100.80.46.1
qemu-guest-agent-3.1.1.1-150100.80.46.1
qemu-ipxe-1.0.0+-150100.80.46.1
qemu-kvm-3.1.1.1-150100.80.46.1
qemu-lang-3.1.1.1-150100.80.46.1
qemu-seabios-1.12.0_0_ga698c89-150100.80.46.1
qemu-sgabios-8-150100.80.46.1
qemu-tools-3.1.1.1-150100.80.46.1
qemu-ui-curses-3.1.1.1-150100.80.46.1
qemu-ui-gtk-3.1.1.1-150100.80.46.1
qemu-vgabios-1.12.0_0_ga698c89-150100.80.46.1
qemu-x86-3.1.1.1-150100.80.46.1
SUSE Linux Enterprise Server 15 SP1-LTSS
qemu-3.1.1.1-150100.80.46.1
qemu-arm-3.1.1.1-150100.80.46.1
qemu-audio-alsa-3.1.1.1-150100.80.46.1
qemu-audio-oss-3.1.1.1-150100.80.46.1
qemu-audio-pa-3.1.1.1-150100.80.46.1
qemu-block-curl-3.1.1.1-150100.80.46.1
qemu-block-iscsi-3.1.1.1-150100.80.46.1
qemu-block-rbd-3.1.1.1-150100.80.46.1
qemu-block-ssh-3.1.1.1-150100.80.46.1
qemu-guest-agent-3.1.1.1-150100.80.46.1
qemu-ipxe-1.0.0+-150100.80.46.1
qemu-kvm-3.1.1.1-150100.80.46.1
qemu-lang-3.1.1.1-150100.80.46.1
qemu-ppc-3.1.1.1-150100.80.46.1
qemu-s390-3.1.1.1-150100.80.46.1
qemu-seabios-1.12.0_0_ga698c89-150100.80.46.1
qemu-sgabios-8-150100.80.46.1
qemu-tools-3.1.1.1-150100.80.46.1
qemu-ui-curses-3.1.1.1-150100.80.46.1
qemu-ui-gtk-3.1.1.1-150100.80.46.1
qemu-vgabios-1.12.0_0_ga698c89-150100.80.46.1
qemu-x86-3.1.1.1-150100.80.46.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
qemu-3.1.1.1-150100.80.46.1
qemu-audio-alsa-3.1.1.1-150100.80.46.1
qemu-audio-oss-3.1.1.1-150100.80.46.1
qemu-audio-pa-3.1.1.1-150100.80.46.1
qemu-block-curl-3.1.1.1-150100.80.46.1
qemu-block-iscsi-3.1.1.1-150100.80.46.1
qemu-block-rbd-3.1.1.1-150100.80.46.1
qemu-block-ssh-3.1.1.1-150100.80.46.1
qemu-guest-agent-3.1.1.1-150100.80.46.1
qemu-ipxe-1.0.0+-150100.80.46.1
qemu-kvm-3.1.1.1-150100.80.46.1
qemu-lang-3.1.1.1-150100.80.46.1
qemu-ppc-3.1.1.1-150100.80.46.1
qemu-seabios-1.12.0_0_ga698c89-150100.80.46.1
qemu-sgabios-8-150100.80.46.1
qemu-tools-3.1.1.1-150100.80.46.1
qemu-ui-curses-3.1.1.1-150100.80.46.1
qemu-ui-gtk-3.1.1.1-150100.80.46.1
qemu-vgabios-1.12.0_0_ga698c89-150100.80.46.1
qemu-x86-3.1.1.1-150100.80.46.1

Описание

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:qemu-3.1.1.1-150100.80.46.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:qemu-arm-3.1.1.1-150100.80.46.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:qemu-audio-alsa-3.1.1.1-150100.80.46.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:qemu-audio-oss-3.1.1.1-150100.80.46.1

Ссылки