Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:3015-1

Опубликовано: 28 июл. 2023
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • CVE-2021-4207: Fixed double fetch in qxl_cursor() that could lead to heap buffer overflow (bsc#1198037).
  • CVE-2023-0330: Fixed DMA reentrancy issue that could lead to stack overflow (bsc#1207205).
  • CVE-2023-2861: Fixed improper access control on special files (bsc#1212968).

Список пакетов

Image SLES12-SP5-EC2-ECS-On-Demand
qemu-tools-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5
qemu-3.1.1.1-69.1
qemu-arm-3.1.1.1-69.1
qemu-audio-alsa-3.1.1.1-69.1
qemu-audio-oss-3.1.1.1-69.1
qemu-audio-pa-3.1.1.1-69.1
qemu-audio-sdl-3.1.1.1-69.1
qemu-block-curl-3.1.1.1-69.1
qemu-block-iscsi-3.1.1.1-69.1
qemu-block-rbd-3.1.1.1-69.1
qemu-block-ssh-3.1.1.1-69.1
qemu-guest-agent-3.1.1.1-69.1
qemu-ipxe-1.0.0+-69.1
qemu-kvm-3.1.1.1-69.1
qemu-lang-3.1.1.1-69.1
qemu-ppc-3.1.1.1-69.1
qemu-s390-3.1.1.1-69.1
qemu-seabios-1.12.0_0_ga698c89-69.1
qemu-sgabios-8-69.1
qemu-tools-3.1.1.1-69.1
qemu-ui-curses-3.1.1.1-69.1
qemu-ui-gtk-3.1.1.1-69.1
qemu-ui-sdl-3.1.1.1-69.1
qemu-vgabios-1.12.0_0_ga698c89-69.1
qemu-x86-3.1.1.1-69.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
qemu-3.1.1.1-69.1
qemu-arm-3.1.1.1-69.1
qemu-audio-alsa-3.1.1.1-69.1
qemu-audio-oss-3.1.1.1-69.1
qemu-audio-pa-3.1.1.1-69.1
qemu-audio-sdl-3.1.1.1-69.1
qemu-block-curl-3.1.1.1-69.1
qemu-block-iscsi-3.1.1.1-69.1
qemu-block-rbd-3.1.1.1-69.1
qemu-block-ssh-3.1.1.1-69.1
qemu-guest-agent-3.1.1.1-69.1
qemu-ipxe-1.0.0+-69.1
qemu-kvm-3.1.1.1-69.1
qemu-lang-3.1.1.1-69.1
qemu-ppc-3.1.1.1-69.1
qemu-s390-3.1.1.1-69.1
qemu-seabios-1.12.0_0_ga698c89-69.1
qemu-sgabios-8-69.1
qemu-tools-3.1.1.1-69.1
qemu-ui-curses-3.1.1.1-69.1
qemu-ui-gtk-3.1.1.1-69.1
qemu-ui-sdl-3.1.1.1-69.1
qemu-vgabios-1.12.0_0_ga698c89-69.1
qemu-x86-3.1.1.1-69.1

Описание

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-69.1

Ссылки

Описание

A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-69.1

Ссылки

Описание

A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.


Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-69.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-69.1

Ссылки